YOU CAN GET IN BUT NEVER GET REAL DATA OUT
WHAT IF,
YOU WOKE UP
TOMORROW
MORNING
AND
 YOUR ENTIRE FAMILY’S IDENTITY, STOLEN
 YOUR COMPANY HAD A BREACH AND YOUR LIFE’S
WORK, STOLEN
 YOUR UTILITY COMPANY WAS HACKED, NO ELECTRIC,
GAS OR WATER
 MASS TRANSIT STOPPED
 ATM’S STOPPED
 EVEN YOUR CAR’S COMPUTER IS UNDER CONTROL BY A
CYBER CRIMINAL
WHAT CAN WE DO?
OUR TIME HAS COME, PANIC NO MORE
CHIMERA DATA SHIELD IS HERE
WE PROTECT THE “CROWN JEWELS” OF ANY
ENTERPRISE
AND
HERE IS HOW WE DO IT
 Convert “Crown Jewels” Into Machine Code
 Masking and Scrambling Technology
 (Ai) Artificial Intelligence
 Dark Drives
 Create A Mirage Of False Data
 Data Is Locked In A World Of Deception That
Chimera Creates
 We Mask And Lock Website Pathways And
Remote Access Points, Whole Networks
 We Use “Lisp” For Intelligent Intruder Blockage And
Reporting
 Multifaceted Intelligent Masking Language (Mime)
 We Are Always On, Chimera Never Sleeps Nor Can
We Be Deactivated
 We Bypass Remote Hacker Security And Our
Embedded Proprietary Location Virus Will Track
Them Down
 We Are Always Aware Of Who Is On, Where They
Are, And What They Are Doing. We Are Aware Of
Every Block Of Memory Used.
 We Exceed NSA Orange Book 8500.02
Standards When Properly Implemented
 The World’s First Proactive Intelligent And
Aware Protection Solution
 Chimera Holds The Key To What Is Real
And What Is Not
Who Do We Protect ?
All Assets Of Enterprise Large And Small
(All Intellectual Property)
Federal, State And Local Governments
Military
Financial And Banking
Retail
Healthcare
Media
Communications
Infrastructure Of All Kinds
The Team:
Shelly Simon- managing director – life long entrepreneur with over 25 years
experience running his own manufacturing company . Shelly with a $25,000
investment built the company in 5 years to wholesale sales of $20,000,000.
Michael Burke – chief visionary – director and creator of our software,
engineer, patent and copyright holder, winner of several awards Arthur C May,
Princeton and featured in Who's Who.
Manuel Santos – cto – software architect with over 20 years experience and
wrote the original code with Mr. Burke used by Chimera and is a Certified
Microsoft Developer/Trainer.
Nino Caldarola – director – advisor – Nino has over 25 years of mechanical
engineering experience . Nino currently holds his ICE (Inventor 10 Certified
Expert’s) certification and certification in Aircraft Engineering Technology
(Ryerson Polytech, Toronto).
Larry Cherrett, director - in-house legal Officer -technology oriented with legal
and scientific expertise - Corporate lawyer with over 20 years of experience -
Previously employed as a Theoretical Nuclear Physicist for Atomic Energy
Canada - Awarded a Canadian Rhodes scholarship
Competitive Environment:
Last year, the global security technology and services market was worth $67
billion; by 2016 it should be worth $86 billion, conservatively. Cybercrime is a
growth industry. The returns are great and the risks are low. We estimate that
the likely annual cost to the global economy from cybercrime is more than
$400 billion. The global cyber security market is highly competitive and
substantially fragmented. The 20 leading companies in the market are
primarily US based IT and defense companies, with the rise of defense
contractors one of the key recent developments in the market's competitive
landscape.
This gives Chimera Date Shield a leg-up and a huge advantage in today’s
market since there are very few competitors using our methodology and
approach. With that said, top cyber- security companies such as The Boeing
Company, Booz Allen Hamilton Inc, Cisco Systems Inc, Computer Sciences
Corporation, Dell Inc, General Dynamics Corporation, Hewlett Packard
Company, International Business Machines Corporation (IBM) would find a
common interest working with us. Chimera would only compliment their
security platforms by protecting the clients' properties.
In fact anyone of these cyber security giants just mentioned would possibly
acquire Chimera Data Shield.
RSA Conference, the world’s leading information
security conferences and expositions, took place in
May 2015. Conference open with RSA Conference
President and Keynote speaker Amit Yoran:
I quote “We are living in the Dark Ages of
security. We cling to outmoded worldviews
and rely on tools and tactics from the past,
and yet we are surprised to find ourselves
living in an era of chaos and violence. We
must cast off the past and enter an Age of
Enlightenment by pursuing greater visibility
into and understanding of our digital world”.
“Engage people with what they expect. It settles them into
predictable patterns while you wait for the extraordinary
moment-that which they cannot anticipate.” When the
hackers get in, they believe they have won. This is when we
defeat them. The files they steal are useless or directed, their
position is revealed, and we can stall them by providing
seemingly easy access to even richer fictional targets.
With all this said there is only one answer, Our Time Has Come !
CHIMERA DATA SHIELD
Any questions or additional information needed - please contact Shelly Simon @ 617.658.3104 or
561.370.3672 email - ssimon@chimeratashield.com

More Related Content

PDF
Kijiji 160616
PPTX
When the Internet of Things meets the Blockchain
PPTX
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
PDF
Security, Compliance and Cloud - Jelecos
PDF
EuroCACS 2016 There are giants in the sky
PDF
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
PPTX
Preventing the Digital 9/11 & Other Cyber Disasters
PPTX
Introduction to ENT (Entity Network Translation)
Kijiji 160616
When the Internet of Things meets the Blockchain
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Security, Compliance and Cloud - Jelecos
EuroCACS 2016 There are giants in the sky
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Preventing the Digital 9/11 & Other Cyber Disasters
Introduction to ENT (Entity Network Translation)

What's hot (20)

PPSX
Rampart services corporate ppt
PDF
Securing the internet of things: The conversation you need to have with your CEO
PDF
Security - A Digital Transformation Enabler
PPTX
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
PPTX
La Inteligencia Artificial aplicada en los negocios
PPTX
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
PDF
Cybersecurity, a priority for leaders today. Not only operational and financi...
PDF
RisingStarsOfCybersecurity
PPTX
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
PPTX
Data security 2016 trends and questions
PDF
Top 25 Cyber Security Blogs You Should Be Reading
PPTX
A DISA Presentaion
PDF
How Blockchain Will Transform the IoT
PDF
Guardians of the future what should we do to secure future cyberspace
PPTX
Legal issues of the Internet of Things
PDF
How Artificial Intelligence is accelerating adoption of IoT
PDF
SecureMAG vol9
PDF
Blockchain - ISG Future Network Summit Presentation, 2018
PDF
Silicon Valley top 20
PPTX
Cool Infographics: what venture capitalists tell us about Homeland Security
Rampart services corporate ppt
Securing the internet of things: The conversation you need to have with your CEO
Security - A Digital Transformation Enabler
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
La Inteligencia Artificial aplicada en los negocios
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Cybersecurity, a priority for leaders today. Not only operational and financi...
RisingStarsOfCybersecurity
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Data security 2016 trends and questions
Top 25 Cyber Security Blogs You Should Be Reading
A DISA Presentaion
How Blockchain Will Transform the IoT
Guardians of the future what should we do to secure future cyberspace
Legal issues of the Internet of Things
How Artificial Intelligence is accelerating adoption of IoT
SecureMAG vol9
Blockchain - ISG Future Network Summit Presentation, 2018
Silicon Valley top 20
Cool Infographics: what venture capitalists tell us about Homeland Security
Ad

Viewers also liked (18)

PPTX
La nube
PPTX
Modding pc colombia
PPTX
Personal Digital Library_PowerPoint Presentation_120213
PPTX
Time Domain response of second order linear circuit
PPTX
Contributor qualities
PPTX
Poisson’s and Laplace’s Equation
PPTX
Solar Energy presentation
PPTX
Hybrid model for Transistor, small signal Analysis
PPTX
No-load & blocked rotor test, Equivalent circuit, Phasor diagram
PPTX
Topic: Fourier Series ( Periodic Function to change of interval)
PPTX
Orthographic projection
PPT
Thévenin’s Theorems
PPTX
K - Map
PPTX
While , For , Do-While Loop
DOCX
RYAN MINCEY - Resume 2015 military
PPTX
Discrete Fourier Transform
PPTX
Gas turbine cycle (open and closed gas turbine cycle)
PPT
Difference between micro & Macro Economics
La nube
Modding pc colombia
Personal Digital Library_PowerPoint Presentation_120213
Time Domain response of second order linear circuit
Contributor qualities
Poisson’s and Laplace’s Equation
Solar Energy presentation
Hybrid model for Transistor, small signal Analysis
No-load & blocked rotor test, Equivalent circuit, Phasor diagram
Topic: Fourier Series ( Periodic Function to change of interval)
Orthographic projection
Thévenin’s Theorems
K - Map
While , For , Do-While Loop
RYAN MINCEY - Resume 2015 military
Discrete Fourier Transform
Gas turbine cycle (open and closed gas turbine cycle)
Difference between micro & Macro Economics
Ad

Similar to Presentation -A (20)

PDF
Military Cyber Security Market 2019-2029
PPTX
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
PPTX
A Brief Look at Cybersecurity Issues Over Time
PDF
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
PPTX
Delivering Security with GFI MAX - Mark Petrie
PDF
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
PPTX
How US Cybersecurity Executive Order Impacts IBM i Customers
PDF
GreenTec WORMdisk & CYBERdisk Capabilities
PDF
Trend Micro 10 Minute Overview
PPTX
Security in the enterprise - Why You Need It
PDF
Webinar: Why evasive zero day attacks are killing traditional sandboxing
PDF
Mike Schleif - Executive Biography
PDF
A Secure Network Bridging the Gap
PPTX
Managed it business leader ppt
PDF
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
PDF
The 10 most influential leaders in security, 2021
DOCX
" The Invisible Person ... the Security Architect "
PPTX
Webinar cybersecurity presentation-6-2018 (final)
PDF
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Military Cyber Security Market 2019-2029
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
A Brief Look at Cybersecurity Issues Over Time
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Delivering Security with GFI MAX - Mark Petrie
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
How US Cybersecurity Executive Order Impacts IBM i Customers
GreenTec WORMdisk & CYBERdisk Capabilities
Trend Micro 10 Minute Overview
Security in the enterprise - Why You Need It
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Mike Schleif - Executive Biography
A Secure Network Bridging the Gap
Managed it business leader ppt
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
The 10 most influential leaders in security, 2021
" The Invisible Person ... the Security Architect "
Webinar cybersecurity presentation-6-2018 (final)
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024

Presentation -A

  • 1. YOU CAN GET IN BUT NEVER GET REAL DATA OUT
  • 2. WHAT IF, YOU WOKE UP TOMORROW MORNING AND
  • 3.  YOUR ENTIRE FAMILY’S IDENTITY, STOLEN  YOUR COMPANY HAD A BREACH AND YOUR LIFE’S WORK, STOLEN  YOUR UTILITY COMPANY WAS HACKED, NO ELECTRIC, GAS OR WATER  MASS TRANSIT STOPPED  ATM’S STOPPED  EVEN YOUR CAR’S COMPUTER IS UNDER CONTROL BY A CYBER CRIMINAL WHAT CAN WE DO?
  • 4. OUR TIME HAS COME, PANIC NO MORE CHIMERA DATA SHIELD IS HERE WE PROTECT THE “CROWN JEWELS” OF ANY ENTERPRISE AND HERE IS HOW WE DO IT
  • 5.  Convert “Crown Jewels” Into Machine Code  Masking and Scrambling Technology  (Ai) Artificial Intelligence  Dark Drives  Create A Mirage Of False Data  Data Is Locked In A World Of Deception That Chimera Creates  We Mask And Lock Website Pathways And Remote Access Points, Whole Networks
  • 6.  We Use “Lisp” For Intelligent Intruder Blockage And Reporting  Multifaceted Intelligent Masking Language (Mime)  We Are Always On, Chimera Never Sleeps Nor Can We Be Deactivated  We Bypass Remote Hacker Security And Our Embedded Proprietary Location Virus Will Track Them Down  We Are Always Aware Of Who Is On, Where They Are, And What They Are Doing. We Are Aware Of Every Block Of Memory Used.
  • 7.  We Exceed NSA Orange Book 8500.02 Standards When Properly Implemented  The World’s First Proactive Intelligent And Aware Protection Solution  Chimera Holds The Key To What Is Real And What Is Not
  • 8. Who Do We Protect ? All Assets Of Enterprise Large And Small (All Intellectual Property) Federal, State And Local Governments Military Financial And Banking Retail Healthcare Media Communications Infrastructure Of All Kinds
  • 9. The Team: Shelly Simon- managing director – life long entrepreneur with over 25 years experience running his own manufacturing company . Shelly with a $25,000 investment built the company in 5 years to wholesale sales of $20,000,000. Michael Burke – chief visionary – director and creator of our software, engineer, patent and copyright holder, winner of several awards Arthur C May, Princeton and featured in Who's Who. Manuel Santos – cto – software architect with over 20 years experience and wrote the original code with Mr. Burke used by Chimera and is a Certified Microsoft Developer/Trainer. Nino Caldarola – director – advisor – Nino has over 25 years of mechanical engineering experience . Nino currently holds his ICE (Inventor 10 Certified Expert’s) certification and certification in Aircraft Engineering Technology (Ryerson Polytech, Toronto). Larry Cherrett, director - in-house legal Officer -technology oriented with legal and scientific expertise - Corporate lawyer with over 20 years of experience - Previously employed as a Theoretical Nuclear Physicist for Atomic Energy Canada - Awarded a Canadian Rhodes scholarship
  • 10. Competitive Environment: Last year, the global security technology and services market was worth $67 billion; by 2016 it should be worth $86 billion, conservatively. Cybercrime is a growth industry. The returns are great and the risks are low. We estimate that the likely annual cost to the global economy from cybercrime is more than $400 billion. The global cyber security market is highly competitive and substantially fragmented. The 20 leading companies in the market are primarily US based IT and defense companies, with the rise of defense contractors one of the key recent developments in the market's competitive landscape. This gives Chimera Date Shield a leg-up and a huge advantage in today’s market since there are very few competitors using our methodology and approach. With that said, top cyber- security companies such as The Boeing Company, Booz Allen Hamilton Inc, Cisco Systems Inc, Computer Sciences Corporation, Dell Inc, General Dynamics Corporation, Hewlett Packard Company, International Business Machines Corporation (IBM) would find a common interest working with us. Chimera would only compliment their security platforms by protecting the clients' properties. In fact anyone of these cyber security giants just mentioned would possibly acquire Chimera Data Shield.
  • 11. RSA Conference, the world’s leading information security conferences and expositions, took place in May 2015. Conference open with RSA Conference President and Keynote speaker Amit Yoran: I quote “We are living in the Dark Ages of security. We cling to outmoded worldviews and rely on tools and tactics from the past, and yet we are surprised to find ourselves living in an era of chaos and violence. We must cast off the past and enter an Age of Enlightenment by pursuing greater visibility into and understanding of our digital world”.
  • 12. “Engage people with what they expect. It settles them into predictable patterns while you wait for the extraordinary moment-that which they cannot anticipate.” When the hackers get in, they believe they have won. This is when we defeat them. The files they steal are useless or directed, their position is revealed, and we can stall them by providing seemingly easy access to even richer fictional targets. With all this said there is only one answer, Our Time Has Come ! CHIMERA DATA SHIELD Any questions or additional information needed - please contact Shelly Simon @ 617.658.3104 or 561.370.3672 email - ssimon@chimeratashield.com