SlideShare a Scribd company logo
An Offering from Transformationplus
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Our Why That Drives Our What
We are a company which
harnesses the digital disruption
to
develop products &
services that make life
simple.
Our Vision
iSecureCyber is innovated by Transformationplus,
which is a product innovation company.
iSecureCyber realises small and medium organisations
face several challenges when identifying, classifying,
monitoring and mitigating cyber risk.
iSecureCyber enables easy management of cyber risks
using end to end automation, built-in intelligence and
integration with other cyber security products.
Company Overview
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
The Problem
70% of SMBs would experience increased
cyber attacks owing to lack of knowledge
on how to protect their organization from
these attacks
55% of SMBs lack in budget planning on
cybersecurity.
80% of Australian SMBs are estimated to
go bankrupt within 12 months owing to
cyber attacks
Source: NSW Business Chamber
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
A one stop cloud platform that automates
the work of a cyber officer
1. Developed to be easily operated by the
nontechnical novice user.
2. End to End (E2E) automation provides
‘implement and forget’ functionality.
3. Integrates with different cyber and non
cyber products to provide holistic and
meaningful insights to defend against
cyber attacks.
4. Designed specifically to address Small
& Medium Business’s Cyber Risk
Our Solution
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Catered towards SMBs that lack cybersecurity
expertise and budget, iSecureCyber has the
built-in intelligence to automatically implement
complex decisions thereby negating the needs
of expert professionals
Modelled on the basis of the industry backed
data, iSecureCyber has a robust Cyber Early
Warning System (CEWS) as an alert mechanism
to indicate the probable cyber attacks
Easy to use Cyber Handbook (CHB) providing
step - by - step info to improve on the maturity
level of cyber resilience with an 80% reduction in
efforts
Provides 100% of the value at 30% of the cost.
Source: NSW Business Chamber
How iSecureCyber
solves the problem
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Base
Supply chain
security
Interim
Cyber certification
management
Advanced
Centralised cyber
platform
Futuristic
Travel cyber
security
Giant leap
Cyber automation
hub
Our Roadmap
August
2020
launched
March
2021
July
2021
December
2021
December
2022
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Arvinth Kumar
Cyber Associate Consultant
Qualified CCNA professional
with compliance and standards
skilled such as ISO27001 and
CPS234
Gokul Srinivasan
PRABIR SAHA
Founder & Executive
Director
A successful entrepreneur
with more than 25 years of
experience in leading large
profitable cohort for disruptive
technologies, automation and
innovation, who then are
creating the next generation
solutions for his customers.
Prakash
Balasubramanian
William McClure
Head of Threat Intelligence
Experienced IT professional with
extensive experience in
infrastructure/support and
security
Chief Product Owner &
Co-founder
Cybersecurity expert certified in
CISSP,CISM,CISA,
CEH,CRISC and having 15
years of industrial experience
Chief Technical Officer
Founder of a software company
(Axel IT) and over 15 years of
experience in developing and
enhancing technology for
businesses
Our Team
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Our Business Model
Five Minutes Onboarding
Choose Subscription Type
Complete Trial
Click for Trial
5
Payment
We have a very simple
Software as a Service
business model with instant
onboarding through our
website and leveraging on our
partner networks. Its simplicity
and scalability help us to built
good customer relationships.
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Delighters
Basic
Satisfiers
Basic
This is a sample
text.
Insert your desired
text here.
Delighters
One platform that SMB’s need
to use. No Extras and No BIG
$$$. Your Cyber Defense in
your hand!
Mandatory Characteristics
iSecureCyber can be
customized & implemented
across SMB's
Basic
Expected characteristics of a
Cybersecurity management
is available within
iSecureCyber
Satisfaction
Functionality
Kano Model Analysis
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
iSecureCyber enables effective and
automated identification of cyber risk
1. Dashboard catering to the senior management
3. Separate instances for Australia, Europe, US
and India
4. PHP and Angular JS stack providing stability,
functionality and simplistic UI design
2. Hosted on AWS
Our Product
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Maintain compliance with
regulations and standards
1
2
3
4
Centralized, simplified and effective
management of cybersecurity
Ability to showcase
cybersecurity maturity as a
selling point to clients
Achieve and maintain cyber
security certifications (ISO27001,
SOC2-type 2) etc.
Value To Customers
REDUCE Cost &
Effort By 90%
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
“Simplicity of the product and
support from the Tplus team
have stood out.”
“iSecurecyber is at the leading
edge of how multiple parties will
share compliance information
going forward.”
“Team managed to
demonstrate their flexibility,
work ethics and the icing on
the cake is the ease of use of
their iSecureCyber.”
“We have used iSecurecyber
to attract other valuable
customers.”
“
”
“
”
Nick Gatland
COO & CRO at
Locii
Rakesh Routhu
Co-Founder & COO at
Aerologix
Testimonials from Early
Adopters
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Market Validation
(Impact of third-party risks)
37%
Damage to Reputation
30%
Poor customer
experiences
29%
Cost incurred for
remediation
43%
Loss of customer trust
42%
Loss of revenue
38%
Failure to Innovate/execute
strategy
Third-Party
breaches
Increased by
35% from
year 2017 to
2019
Source: A commissioned study conducted by Forrester Consulting on behalf of RSA, December 2019
https://www.darkreading.com/attacks-breaches/third-party-breaches---and-the-number-of-records-exposed---increased-sharply-in-2019/d/d-id/1337037
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
400 Million +
TAM
400 Million+
Total SMB’s worldwide
Total SMB’s in N America, Middle-east,
Europe and Asia Pacific
200M + SMB’s /$1 Trillion
Total target SMB’s
(20% of available market)
40M+ SMB’s/$240B
SAM
SOM
400M+ SMB’s + & $ 2 Trillion
Source: Australian small business and family enterprise
Connected small business US: Deloitte
Europe: No. of SMEs, Statista
Asia Pacific Economic Corporation
SME’s in Asia: Wonder Research
The Middle east Investment Initiative
National Action Plans on Business and Human Rights
Average per SMB= 6000$
Market Size
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Factors Responsible Are:
• Increase in stringent compliance
mandates.
• Lack of in-house competencies in the
organization.
• The rising instances of cyberattacks.
• Faster adoption by SMEs for TPRM
solutions. 2019 2022
3.2
Billion
USD
6.5
Billion
USD
3.2
Billion
USD
6.5
Billion
USD
Attractive Market Opportunities in TPRM
Source: https://www.marketsandmarkets.com/Market-Reports/third-party-risk-management-market-
222423768.html
* CAGR=Compound Annual Growth Rate
*TPRM=Third-Party Risk Management
Global Growth Estimation in
Market Size
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Role
Industries
C-level executive
Vice president
Director
All industries
Size of Business
Small
Medium
Large
* The bar graph denotes the number of targets for iSecureCyber in different size and roles in the businesses
Customer
Demographics
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Initial
Stage
• Content Marketing (Video)
• Digital Marketing
• POC
• SEO
• Referral Strategy
Growth
Stage
• Events and experiences
• Local sponsorships
• High-level partnerships
(ISACA, AISA)
• Outbound advertising
• Word-of-mouth referrals
Customers
Advocates
Visitors
Leads
Seekers
Customer Acquisition
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Third- party
Networks20%
Referrals
20%
Distribution
Channels
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
CompetitorsNicheLeaders
ExpensiveAffordable
Offers affordable and
easy to use third-party
vendor management
software
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Investment
Opportunity
We’re looking for (series A)- $5M in
funding, 40% of which will be spent on
operations, 40% on human resources,
and 20% on marketing. This will allow us
to generate $7.5M in revenue in the
next 48 months.
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Why Invest Now
Big Opportunity
Compelling Market Validation
Uncomplicated Business Model
Strong Scalability
Solid Team
1
2
3
4
5
Single product at 10% cost
Attractive market opportunities of 6.5 Billion USD
With five minutes onboarding
A diverse team with longstanding relations
Gross margin of 100% and virtually no COGS generated
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Contact Us
info@transformationplus.com
info@isecurecyber.com
0421 010 510
10 Penrose Street,
Marsden Park, NSW 2765,
Australia
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Thank You
Questions?

More Related Content

PPSX
iSecureCyber - Short Pitch Deck
PPSX
Transformationplus Corporate Profile
PPSX
Transformationplus Cyber Security Offering v10
PPTX
WatchGuard Firewall & Network Security
PPTX
"Azure is the new black”
PDF
Ims at mindtree key concepts and paradigms
PPTX
HUMAN FACTOR AND IT/OT CORRELATION
PPTX
Alpha & Omega Presentation
iSecureCyber - Short Pitch Deck
Transformationplus Corporate Profile
Transformationplus Cyber Security Offering v10
WatchGuard Firewall & Network Security
"Azure is the new black”
Ims at mindtree key concepts and paradigms
HUMAN FACTOR AND IT/OT CORRELATION
Alpha & Omega Presentation

What's hot (20)

PPTX
HP: De toekomst van personal computing toestellen.
PDF
Marcegaglia Group
PDF
SAAOne Case Study: Private cloud for data clearway
PDF
Universal Motors Agencies
PDF
Vynxgroup profile
PPTX
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
PDF
Managing Change in a Modern DevOps-Powered Enterprise
PDF
Mindtree IMS Secret Sauce (Fact sheet)
PDF
IBB Energie AG
PDF
Schmitz Cargobull
PPTX
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
PDF
BDNA joins Flexera
PDF
ePlus Intelligent Branch
PPTX
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
PPTX
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
PDF
Nirnaya System & Solutions Pvt Ltd Company Profile
PPTX
Upgrade kit
PPTX
Noi siamo Ivanti: più forti insieme!
PDF
Managed Converged Infrastructure
HP: De toekomst van personal computing toestellen.
Marcegaglia Group
SAAOne Case Study: Private cloud for data clearway
Universal Motors Agencies
Vynxgroup profile
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
Managing Change in a Modern DevOps-Powered Enterprise
Mindtree IMS Secret Sauce (Fact sheet)
IBB Energie AG
Schmitz Cargobull
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
BDNA joins Flexera
ePlus Intelligent Branch
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Nirnaya System & Solutions Pvt Ltd Company Profile
Upgrade kit
Noi siamo Ivanti: più forti insieme!
Managed Converged Infrastructure
Ad

Similar to iSecureCyber (Long Pitch Deck) (20)

PPTX
ITExpertUS Corporate (CyberSecurity) 2023.pptx
PPTX
FINTECH: Industries we Serve
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PDF
Building Scalable & Secure Software: Why IT Business Consulting is a Game Cha...
PDF
Cyber security guide
PPTX
Cybersecurity pres 05-19-final
PPTX
Why SMBs Outsource IT to MSPs
PDF
Why Cybersecurity Services Are Non-Negotiable in Today’s Digital World.pdf
PDF
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
PDF
empowering your business with top-notch cybersecurity services.pdf
PPTX
2016 Risk Management Workshop
PDF
Slides to the online event "Creating an effective cybersecurity strategy" by ...
PDF
The Ultimate Guide to Cybersecurity Services and Solutions for Businesses
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
PDF
Small Business Playbook for Security and Compliance Success.pdf
PPTX
Small Business Playbook for Security and Compliance Success.pptx
PDF
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
PDF
Cybersecurity Made Simple: How to Protect Your Business in 2025
PDF
ITExpertUS Corporate (CyberSecurity) 2023.pptx
FINTECH: Industries we Serve
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
Building Scalable & Secure Software: Why IT Business Consulting is a Game Cha...
Cyber security guide
Cybersecurity pres 05-19-final
Why SMBs Outsource IT to MSPs
Why Cybersecurity Services Are Non-Negotiable in Today’s Digital World.pdf
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
empowering your business with top-notch cybersecurity services.pdf
2016 Risk Management Workshop
Slides to the online event "Creating an effective cybersecurity strategy" by ...
The Ultimate Guide to Cybersecurity Services and Solutions for Businesses
Infographic: 5 Tips for Approaching Customers About Cloud Security
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pptx
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Made Simple: How to Protect Your Business in 2025
Ad

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)

iSecureCyber (Long Pitch Deck)

  • 1. An Offering from Transformationplus
  • 2. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Our Why That Drives Our What We are a company which harnesses the digital disruption to develop products & services that make life simple. Our Vision
  • 3. iSecureCyber is innovated by Transformationplus, which is a product innovation company. iSecureCyber realises small and medium organisations face several challenges when identifying, classifying, monitoring and mitigating cyber risk. iSecureCyber enables easy management of cyber risks using end to end automation, built-in intelligence and integration with other cyber security products. Company Overview
  • 4. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus The Problem 70% of SMBs would experience increased cyber attacks owing to lack of knowledge on how to protect their organization from these attacks 55% of SMBs lack in budget planning on cybersecurity. 80% of Australian SMBs are estimated to go bankrupt within 12 months owing to cyber attacks Source: NSW Business Chamber
  • 5. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus A one stop cloud platform that automates the work of a cyber officer 1. Developed to be easily operated by the nontechnical novice user. 2. End to End (E2E) automation provides ‘implement and forget’ functionality. 3. Integrates with different cyber and non cyber products to provide holistic and meaningful insights to defend against cyber attacks. 4. Designed specifically to address Small & Medium Business’s Cyber Risk Our Solution
  • 6. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Catered towards SMBs that lack cybersecurity expertise and budget, iSecureCyber has the built-in intelligence to automatically implement complex decisions thereby negating the needs of expert professionals Modelled on the basis of the industry backed data, iSecureCyber has a robust Cyber Early Warning System (CEWS) as an alert mechanism to indicate the probable cyber attacks Easy to use Cyber Handbook (CHB) providing step - by - step info to improve on the maturity level of cyber resilience with an 80% reduction in efforts Provides 100% of the value at 30% of the cost. Source: NSW Business Chamber How iSecureCyber solves the problem
  • 7. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Base Supply chain security Interim Cyber certification management Advanced Centralised cyber platform Futuristic Travel cyber security Giant leap Cyber automation hub Our Roadmap August 2020 launched March 2021 July 2021 December 2021 December 2022
  • 8. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Arvinth Kumar Cyber Associate Consultant Qualified CCNA professional with compliance and standards skilled such as ISO27001 and CPS234 Gokul Srinivasan PRABIR SAHA Founder & Executive Director A successful entrepreneur with more than 25 years of experience in leading large profitable cohort for disruptive technologies, automation and innovation, who then are creating the next generation solutions for his customers. Prakash Balasubramanian William McClure Head of Threat Intelligence Experienced IT professional with extensive experience in infrastructure/support and security Chief Product Owner & Co-founder Cybersecurity expert certified in CISSP,CISM,CISA, CEH,CRISC and having 15 years of industrial experience Chief Technical Officer Founder of a software company (Axel IT) and over 15 years of experience in developing and enhancing technology for businesses Our Team
  • 9. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Our Business Model Five Minutes Onboarding Choose Subscription Type Complete Trial Click for Trial 5 Payment We have a very simple Software as a Service business model with instant onboarding through our website and leveraging on our partner networks. Its simplicity and scalability help us to built good customer relationships.
  • 10. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Delighters Basic Satisfiers Basic This is a sample text. Insert your desired text here. Delighters One platform that SMB’s need to use. No Extras and No BIG $$$. Your Cyber Defense in your hand! Mandatory Characteristics iSecureCyber can be customized & implemented across SMB's Basic Expected characteristics of a Cybersecurity management is available within iSecureCyber Satisfaction Functionality Kano Model Analysis
  • 11. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus iSecureCyber enables effective and automated identification of cyber risk 1. Dashboard catering to the senior management 3. Separate instances for Australia, Europe, US and India 4. PHP and Angular JS stack providing stability, functionality and simplistic UI design 2. Hosted on AWS Our Product
  • 12. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Maintain compliance with regulations and standards 1 2 3 4 Centralized, simplified and effective management of cybersecurity Ability to showcase cybersecurity maturity as a selling point to clients Achieve and maintain cyber security certifications (ISO27001, SOC2-type 2) etc. Value To Customers REDUCE Cost & Effort By 90%
  • 13. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus “Simplicity of the product and support from the Tplus team have stood out.” “iSecurecyber is at the leading edge of how multiple parties will share compliance information going forward.” “Team managed to demonstrate their flexibility, work ethics and the icing on the cake is the ease of use of their iSecureCyber.” “We have used iSecurecyber to attract other valuable customers.” “ ” “ ” Nick Gatland COO & CRO at Locii Rakesh Routhu Co-Founder & COO at Aerologix Testimonials from Early Adopters
  • 14. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Market Validation (Impact of third-party risks) 37% Damage to Reputation 30% Poor customer experiences 29% Cost incurred for remediation 43% Loss of customer trust 42% Loss of revenue 38% Failure to Innovate/execute strategy Third-Party breaches Increased by 35% from year 2017 to 2019 Source: A commissioned study conducted by Forrester Consulting on behalf of RSA, December 2019 https://www.darkreading.com/attacks-breaches/third-party-breaches---and-the-number-of-records-exposed---increased-sharply-in-2019/d/d-id/1337037
  • 15. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus 400 Million + TAM 400 Million+ Total SMB’s worldwide Total SMB’s in N America, Middle-east, Europe and Asia Pacific 200M + SMB’s /$1 Trillion Total target SMB’s (20% of available market) 40M+ SMB’s/$240B SAM SOM 400M+ SMB’s + & $ 2 Trillion Source: Australian small business and family enterprise Connected small business US: Deloitte Europe: No. of SMEs, Statista Asia Pacific Economic Corporation SME’s in Asia: Wonder Research The Middle east Investment Initiative National Action Plans on Business and Human Rights Average per SMB= 6000$ Market Size
  • 16. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Factors Responsible Are: • Increase in stringent compliance mandates. • Lack of in-house competencies in the organization. • The rising instances of cyberattacks. • Faster adoption by SMEs for TPRM solutions. 2019 2022 3.2 Billion USD 6.5 Billion USD 3.2 Billion USD 6.5 Billion USD Attractive Market Opportunities in TPRM Source: https://www.marketsandmarkets.com/Market-Reports/third-party-risk-management-market- 222423768.html * CAGR=Compound Annual Growth Rate *TPRM=Third-Party Risk Management Global Growth Estimation in Market Size
  • 17. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Role Industries C-level executive Vice president Director All industries Size of Business Small Medium Large * The bar graph denotes the number of targets for iSecureCyber in different size and roles in the businesses Customer Demographics
  • 18. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Initial Stage • Content Marketing (Video) • Digital Marketing • POC • SEO • Referral Strategy Growth Stage • Events and experiences • Local sponsorships • High-level partnerships (ISACA, AISA) • Outbound advertising • Word-of-mouth referrals Customers Advocates Visitors Leads Seekers Customer Acquisition
  • 19. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Third- party Networks20% Referrals 20% Distribution Channels
  • 20. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus CompetitorsNicheLeaders ExpensiveAffordable Offers affordable and easy to use third-party vendor management software
  • 21. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Investment Opportunity We’re looking for (series A)- $5M in funding, 40% of which will be spent on operations, 40% on human resources, and 20% on marketing. This will allow us to generate $7.5M in revenue in the next 48 months.
  • 22. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Why Invest Now Big Opportunity Compelling Market Validation Uncomplicated Business Model Strong Scalability Solid Team 1 2 3 4 5 Single product at 10% cost Attractive market opportunities of 6.5 Billion USD With five minutes onboarding A diverse team with longstanding relations Gross margin of 100% and virtually no COGS generated
  • 23. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Contact Us info@transformationplus.com info@isecurecyber.com 0421 010 510 10 Penrose Street, Marsden Park, NSW 2765, Australia
  • 24. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Thank You Questions?

Editor's Notes

  • #16: TAM: 400M* 6000$= 2T 400B SMB‘s/$ SAM: 200.68M*6000$= 1T20 4B SMB‘s/$ SOM: 40.136M*6000$=240B 816M SMB‘s/$ Canada:1.1 Million US:28.8 Million Middle east:23 Million Europe:25.1 Million Malaysia:20.6 Million Singapore:25.7 Million India:44 Million Hong Kong:29.3 million Australia:2.6 Million NZ: 0.48 Million Total: 200.68 Million Worldwide: 400 million Small SMB‘s= 2000$ per SMB Medium SMB‘s= 10,000$ per SMB