Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle

Syncsort 57 views 92 slides May 14, 2024
Slide 1
Slide 1 of 92
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92

About This Presentation

In today's ever-evolving threat landscape, any siloed systems, or data leave organizations vulnerable. This is especially true when mission-critical systems like IBM i and IBM Z mainframes are not included in your security planning. Valuable security data from these systems often remains isolate...


Slide Content

Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle Bill Hammond | Director, Product Marketing Ian Hartley | Senior Director, Product Management

Today’s Topic Threat landscape evolving Unique challenges of IBM Z and IBM Power Systems Security visibility with Google Chronicle Q&A 2

Today’s security threat landscape

Security Landscape Business-Driven Security Multi-Factor Authentication Business impacts No longer a siloed IT concern. It's a critical business service and security teams are measured on how well they protect business outcomes Not just for financial institutions... Expect to see more biometric authentication methods alongside traditional passwords and codes Boardroom Focus Cloud Integration Rising costs of data breaches driving boards to demand more strategic approaches to risk management Expect continued focus on tighter integration between z/OS security and IBM's cloud security offerings. This would allow for a more holistic view of security posture across hybrid environments. 4

Security Landscape Artificial Intelligence Product Consolidation Double edged sword – AI can assist both security professionals and the bad actors developing new threats Individual security point products being combined into broader platforms that offer a more holistic approach Regulations Driving Change Quantum-Safe Cryptography New regulations are mandating a stronger security posture, forcing organizations to invest in expertise and improve their overall cyber resilience Current encryption solutions will become vulnerable with the broader usage of quantum computing solutions. 5 Marketplace drivers

Unique challenges of IBM systems

IBM i security challenges 7 Perception of Impregnability : A false sense of security can exist due to the platform's strong foundation. Organizations may neglect essential security practices like regular updates, user access controls, and penetration testing. Integration Challenges : IBM i environments often integrate with newer, more open systems. These connections can introduce vulnerabilities if security isn't carefully managed across all platforms. Skilled Staff Shortage : Finding IT security professionals with specific IBM i expertise can be difficult. This can make it challenging to maintain a strong security posture and keep up with the latest threats. Evolving Attack Landscape : Cybercriminals are constantly developing new methods to exploit vulnerabilities. While IBM i is inherently secure, attackers may target weaknesses in custom applications, open-source integrations, or user errors. Keeping Up with Updates : Balancing the need for stability with the importance of applying security patches can be a challenge. Downtime for updates can disrupt critical business operations.

IBM Z security challenges 8 Complexity of the Platform : This complexity can make it difficult to configure security settings correctly and maintain a strong overall security posture. An intricate web of access controls, encryption options, and security profiles needs to be meticulously managed. Skilled Staff Shortage : z/OS environments run mission-critical legacy applications. Finding security professionals with deep expertise in z/OS security can be challenging. Insider Threats : Given the high level of access granted to authorized users on z/OS systems, insider threats pose a significant risk. Rigorous access controls, continuous monitoring, and user activity audits are crucial. Integration with Open Systems : The increasing integration of z/OS with open systems and cloud environments introduces new attack vectors. Ensuring consistent and robust security across these disparate platforms requires careful planning and configuration. Evolving Regulatory Landscape : Data privacy regulations are constantly evolving, placing additional pressure on organizations to secure sensitive data residing on z/OS systems.

Visibility 9 The foundation for effective security monitoring See what's happening in your systems, identify potential threats, and take timely action to protect your valuable data and resources Without visibility, you're essentially operating in the dark, making it difficult to identify and respond to security threats

Benefits of effective security visibility 10 What's Normal? Good visibility allows you to establish a baseline for typical activity within your network. This includes user behavior, data flow, and application usage. Deviations from this baseline can indicate suspicious activity or potential threats Threat Identification Detect unusual events like unauthorized access attempts, malware infections, or data breaches. Security tools can then analyze this data to identify and prioritize potential threats Faster Response When a security incident occurs, good visibility allows you to pinpoint the source and scope of the problem quickly. This enables a faster and more effective response, minimizing damage and downtime Threat Hunting Security teams can proactively hunt for threats by analyzing network traffic and user activity for suspicious patterns. Visibility across different systems allows for a more comprehensive search and helps uncover hidden threats Better Decisions Security decisions are only as good as the information they're based on. Clear visibility provides the data and context needed to make informed choices about security investments, resource allocation, and overall security posture.

Achieving visibility Collect the right data Use a SIEM system Implement alerting Know your assets and risks Monitor continuously

Visibility with Google Chronicle

“Chronicle” … “Security Operations” 13 Google is transitioning “ Chronicle ” to “ Security Operations ” Ironstream for Google Security Operations Source: Images - https:// cloud.google.com /security

Ironstream integrates IBM Z and IBM i into today’s IT operations and security solutions Target Platforms IBM Platforms IBM Z ® IBM i Ironstream ® 14

Ironstream: For Today and Tomorrow 15 Source  Target e .g. IBM i to QRadar 2024 Data Pipelines Simple set-up and control Optional mid-stream “processes” Easily switch or add sources and targets

Ironstream for Google Security Operations 16 IBM i IBM Z Source: https:// cloud.google.com /chronicle/docs/data-ingestion-flow Hub Agent Parsers Default parsers IBM AS/400 IBM i Operating System IBM z/OS Typically need “custom” requirements Logstash Grok-based Relatively straightforward Precisely looking into improvements Ironstream

Security Operations in Action with IBM i and Z 17

Security Operations in Action with IBM i and Z 18 Easily create dashboards Use out-of-the-box dashboards

Why care? Why use Google SecOps? 19 “Cover all your bases” Extended, augmented visibility “Hoarding is rewarding” Storing comprehensive data, longer “Automation station” Agility – fast response is key Source: Google Cloud – The Security Operations Ecosystem Ironstream for IBM Z and IBM i

Q & A

https:// www.precisely.com /product/ ironstream

Presentation name Changing Landscape 22 Business-Driven Security: Security is no longer a siloed IT concern. It's a critical business enabler, and security teams are being measured on how well they protect business outcomes Multi-Factor Authentication (MFA) is becoming essential for all accounts and data, not just financial institutions. Expect to see more biometric authentication methods alongside traditional passwords and codes. Boardroom Focus: Cybersecurity is no longer just an IT concern. With rising costs of data breaches, boards of directors are demanding a more strategic approach to risk management and third-party security assessments Integration with Cloud Security Solutions: Expect continued focus on tighter integration between z/OS security and IBM's cloud security offerings. This would allow for a more holistic view of security posture across hybrid environments. Double edge sward of AI Platform Consolidation: The market is seeing a consolidation of individual security point products into broader platforms that offer a more holistic approach Regulations Driving Change: New regulations are mandating a stronger security posture, forcing organizations to invest in expertise and improve their overall cyber resilience. Quantum-Safe Cryptography Roadmap: With the growing threat of quantum computing, IBM may announce updates to its roadmap for incorporating quantum-safe cryptography into its mainframe security solutions.

How to insert an image How to insert a new slide How to insert a video Choose Picture Correction to adjust the Sharpness, Brightness, and Contrast. How to insert a table Example slides Click on the Home tab in the ribbon and click on the arrow icon on the new slide button. Choose a layout from the drop down selection To change a layout of a slide, click on the Home tab in the ribbon and click on the layout button. Choose a new layout from the drop down selection Click on the icon in the middle of the placeholder and choose the amount of rows and columns you need. Click on your table, and on the Table Tools tab in the ribbon, click on the Design tab. In the Table Styles section, click on the drop down arrow to open the full selection of Table Styles. Pick the one that fits your layout the best. Use the other table style options to design the table to how you need it. You can also use tools on the Layout tab to evenly distribute your rows and columns. Click on the icon in the middle of the placeholder and choose the image from your computer. Click on the Format Picture tab in the ribbon and use the tools to edit the image. Choose Picture Color to adjust the Saturation, Tone, and Color. Choose Picture Correction to adjust the Sharpness, Brightness, and Contrast. Choose to resize and move the image within the placeholder, using the white circles in the corners of the image. Click on the drop down arrow and choose Fit to fit the image to the placeholder. We have filled a selection of example slides for you. Use these as guidance for building your own and then delete them as necessary. There are a large variety of layouts to suit your content. Each layout is customizable, you don’t have to fill each placeholder. Use a selection of different layouts to create variety in your presentation, keeping your audience engaged. Click on the icon in the middle of the placeholder and choose the video from your computer. Click on the Format Video tab in the ribbon and use the tools to edit the image. Choose Picture Color to adjust the Saturation, Tone, and Color. Choose Poster Frame to change the preview image for the video clip. Choose Crop to resize and move the video. Drag the black markers to increase the background area, then use the white markers to fit the video to the area.

Subheads need to be modified manually. Select Precisely Bold from the ribbon. Then change the Font color to purple: To move down a level for sub-bulleted lists, click on Indent More in the ribbon: Keep all headings at the default text style found on your slide Text style guide

SmartArt guide If you require additional colors , please restrict palette to the Precisely color theme by selecting accent colors only. Avoid color combinations that use non-accent colors Please try to avoid using multi-colored diagrams where possible. Precisely Purple is the preferred option and should always be the predominant color .

Presentation name Sample diagram 1 Keep it simple Restrict colors Use fine lines Boxes with straight corners 26

Presentation name Sample diagram 2 1 Keep it simple 2 Use circles or squares 3 Retain white space 4 Stick to the brand palette 27

Presentation name Sample diagram 3 28 Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor Lorum ipsum Lorum ipsum Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor

Sample diagram 4 Presentation name 29 Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing

Presentation name Sample diagram 5 30 Lorum ipsum Lorem ipsum dolor sit ametons ecte tu Lorem ipsum dolor sit amet , cons ecte turadipiscing radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor amet , cons ecte turadipiscing Lorum ipsum Lorem ipsum dolor sit ameons ecte tu Lorem ipsum dolor sit amet , cons ecte turadipiscing radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor amet , cons ecte turadipiscing Lorum ipsum Lorem ipsum dolor sit ametns ecte tu Lorem ipsum dolor sit amet , cons ecte turadipiscing radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor amet , cons ecte turadipiscing

Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Presentation name 39

Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Presentation name 40

Presentation name 41

Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Presentation name 42

3 column slide 1 Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Presentation name Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level 43

3 column slide 2 Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Presentation name 44

Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Click to edit styles Second level Third level Fourth level Fifth level Click to edit styles Second level Third level Fourth level Fifth level Presentation name 45

Lorum ipsum dolor 4Q 2018 4Q 2017 FY 2018 FY 2017 Lorem ipsum dolor sit amet , consectetur 70.8 70.8 70.8 70.8 Lorem ipsum dolor sit amet, consectetur 35.6 90.3 10.7 35.6 Lorem ipsum dolor sit amet, consectetur 90.3 10.7 90.3 10.7 Lorem ipsum dolor sit amet , consectetur 15.3 10.7 35.6 90.3 Lorem ipsum dolor sit amet, consectetur 23.5 90.3 35.6 35.6 Lorem ipsum dolor sit amet , consectetur 10.7 35.6 35.6 Presentation name 46

Presentation name 47

Presentation name 48

Presentation name 49

Presentation name Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level 50

Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Presentation name 51

“It easily met all of our requirements (and exceeded them), was simple for us to install using both local and international support, and the implementation was completed within the scheduled timeframe”. Sam Bonanno Infrastructure Production Manager Auditing database activity to achieve compliance OBJECTIVE Heinz Wattie’s Australia is a subsidiary of the multi-national H.J. Heinz Company The company is extensively audited for SOX compliance Heinz Wattie’s needed audit all changes to their mission critical data CHALLENGES Wanted easy implementation without application modifications that could scale without performance impact Required coverage of all IBM i journal entries, including user-defined entries, and the ability to produce accurate, readable periodic or ad-hoc reports and alerts SOLUTION Assure Monitoring and Reporting BENEFIT Quick implementation, using primarily in-house resources, met their deadline Able to generate all the reports they need to meet their internal needs and compliance requirements – developing more over time Scales to the needs of their environment and journal handling is compatible with their HA software Presentation name 52

OBJECTIVE lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua incididunt ut labore et dolore magna aliqua CHALLENGES Lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua adipiscing elit , sed do eiusmo det tempor SOLUTION Lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua BENEFIT lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua incididunt ut labore et dolore magna aliqua lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua incididunt ut labore et dolore magna aliqua Presentation name 53

WEBSITE Lorem ipsum: dolor sit amet consectetur 28 MAR 28 MAR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 02 APR 02 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 06 APR 08 APR Lorem ipsum: dolor sit amet consectetur 14 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 17 APR Lorem ipsum: dolor sit amet consectetur 09 APR Lorem ipsum: dolor sit amet consectetur 06 MAY 07 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 27 MAR 23 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 09 MAY Presentation name 54

Timeline 2 WEBSITE Lorem ipsum: dolor sit amet consectetur APRIL APRIL Lorem ipsum: dolor sit amet consectetur SOCIAL Lorem ipsum: dolor sit amet consectetur MAY MAY Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur JUNE JUNE Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur JULY JULY Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur AUG AUG Lorem ipsum: dolor sit amet consectetur Presentation name 55

Presentation name 56

Presentation name 57

Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Presentation name 58

Dark table LORUM IPSUM DOLOR 4Q 2018 4Q 2017 FY 2018 FY 2017 Lorem ipsum dolor sit amet , consectetur 70.8 70.8 70.8 70.8 Lorem ipsum dolor sit amet , consectetur 35.6 90.3 10.7 35.6 Lorem ipsum dolor sit amet , consectetur 90.3 10.7 90.3 10.7 Lorem ipsum dolor sit amet , consectetur 15.3 10.7 35.6 90.3 Lorem ipsum dolor sit amet , consectetur 23.5 90.3 35.6 35.6 Lorem ipsum dolor sit amet , consectetur 10.7 35.6 35.6 Presentation name 59

Lorem ipsum dolor ete sit amet , consectetur adipiscing eli Presentation name 60 Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel

Lorem ipsum dolor ete sit amet , consectetur adipiscing eli Lorem ipsum dolor ete sit amet , consectetur adipiscing eli Presentation name 61 Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel

Presentation name 62 Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel

Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel Lorem ipsum dolor ete sit Presentation name 63

Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel Presentation name 64

Example chart Lorem ipsum dolor ete sit Presentation name 65

Example chart Presentation name Lorem ipsum dolor ete sit 66

Example chart $78 M $325 M $2.6 B $612 M XX % CAGR XX % CAGR Lorem ipsum Dolor ete asit Presentation name 67

Sample diagram Veniam quis nostrud Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Veniam quis nostrud Lorem ipsum Lorem ipsum Lorem ipsum Veniam quis nostrud Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Presentation name 68

$10 Billion Lorem ipsum dolor ete sit $24 Billion Lorem ipsum dolor ete sit $650M Lorem ipsum dolor ete sit Big stats Presentation name 69

Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 70

Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 71

Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 72

Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 73

Lorum amet Lorem ipsum dolor sit amet , consec tetur adipiscing elit , sed do aliqua . Ut enim ad minim Lorum amet Lorem ipsum dolor sit amet , consec tetur adipiscing elit , sed do aliqua . Ut enim ad minim Presentation name 74

Presentation name 75

“Lorem ipsum dor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incid idunt ut dolor labore et dolore magna” Name Surname “Lorem ipsum dor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incid idunt ut dolor labore et dolore magna” Name Surname “Lorem ipsum dor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incid idunt ut dolor labore et dolore magna” Name Surname Presentation name 76

Presentation name 77

Journey Lorem ipsum dolor ete sit amet , consectetur Lorem ipsum dolor ete sit amet , consectetur Lorem ipsum dolor ete sit amet , consectetur Lorem ipsum dolor ete sit amet , consectetur Presentation name 78

Presentation name 79

Accuracy counts Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur . Excepteur sint occaecat cupidatat non proident , sunt in culpa qui officia deserunt mollit anim id est laborum Presentation name 80

Accuracy counts Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur . Excepteur sint occaecat cupidatat non proident , sunt in culpa qui officia deserunt mollit anim id est laborum Presentation name 81

Presentation name Consistency gets results Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et laboris nisi ut aliquip ex ea commodo consequat.irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur . 82

Lorem ipsum dolor sit Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in repre enderit in voluptate velit esse cillum dolore eu Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu Presentation name 83

Presentation name 84

Lorem ipsum dolor sit Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in repre enderit in voluptate velit esse cillum dolore eu Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu Presentation name 85

Presentation name 86

Presentation name 87 Lorem ipsum dolor sit Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugia.  Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut. 

Lorem ipsum dolor sit Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugia .  Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut.  

Presentation name 89

Presentation name 90

Presentation name 91
Tags