WELCOME TO PCM’s
Alan Lawrence
President – PCMG-G
Public Sector
Bob Bogle
Senior Vice President
Field Sales West
INVESTMENTS TO SUPPORT ACCOUNT MANAGER AND CUSTOMERS
CUSTOMER
Face to Face
Phone
Digital
Mobile
ACCOUNT
MANAGER
Business
Development
Managers
Engineers &
Pre-Sales
Support
Professional
Services
Managed Services
Microsoft &
Software
Service Delivery
Advanced & Field
STRATIFORM
(Security & Cloud)
MISSION FIRST
• Serving the needs of Public Sector
Customers Worldwide for Nearly 30 Years
• Federal Government (DoD, Civilian,
Advanced Programs)
• State and Local
• Education (K-12 and Higher Ed)
• System Integrators
• Combine Commercial Products from leading
Technology Manufacturers with Certified
Engineer and Integration Service to Tailor
Solutions for Each Customer
• Wide Range of Federal, State and Local, and
Contract Vehicles
• Dedicated, Certified Acquisition and
Program Management Team
2017 marked a major milestone for PCM
We're celebrating 30 years as a trusted IT solutions provider!
We started in garage and now a Global Fortune 1000
IT Solutions and Services Provider
PCM’s SERVICES
LEADERSHIP TEAM
Stephen Moss
SVP, Services & Solutions
Herb Hogue
President, Stratiform
David Hall
SVP, Services
MOBILE, CLOUD AND SECURITY
DIGITAL TRANSFORMATION IS NOW AN IMPERATIVE
WHO IS PCM?
MOBILE FIRST
We live in a world of mobile technology but it’s not the
technology that’s Mobile it’s the users. We assist customers with
custom solutions in multiple form factors with unique
applications, securely, with a complete managed experience.
CLOUD FIRST
An agnostic cloud approach to understanding a customers unique
business and technical requirements leveraging our assess,
implement, manage and enhance methodology to insure a
seamless journey to the clouds.
SECURITY FIRST
A complete security methodology assessing security requirements,
threat areas, business risk leveraging best of breed security
technologies with the governance and processes to implement a
comprehensive security architecture, identifying controls with the
governance to manage them, and the capacity to remediate
threats as the landscape changes.
A HOLISTIC, COMPREHENSIVE SOLUTION COMPANY
MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
Workforce
Anywhere
• Any device – Anywhere
• High, low and no touch
options to transact your
business
• Secure access to data
• Pocket to cloud
enablement
• Fleet and contingent
workforce solutions
Product
Development
• Tailored for customer
experience
• Application accessibility
• Customized solutions
• Custom packaging and
delivery
• Program management
• Data acquisition for
analytics
Support
Everywhere
• Customer experience
driven
• Multi-lingual support
• Global field services
• Warehousing
• Depot options
• Disposal solutions
• Full asset management
MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
All Rights Reserved for Customer Owned Images
Don't worry about which Cloud partner provides your business with
the best options. PCM partners with all of todays leading public
cloud providers to design a solution that fits your business best.
We also integrate with your premise private cloud solution.
Transformation
Methodology
Ongoing
Customer
Success
Solution
Focused
PCM Cloud
Strategy
FOUNDATION OF THE
PCM CLOUD STRATEGY
Platform and
Partners
FOCUSED ON HYBRID
Your Cloud
The PCM Complete for Cloud program gives every customer
access to the Transformational Services, tools and resources
needed at every step of the solution lifecycle.
Assess
• Envisioning Sessions
• Solution Assessments
• Plan & Roadmap
Implement
• Migration Services
• Deployment Services
• Adoption Services
Enhance
• Cloud Advisors
• Cloud Residents
Ongoing
Customer
Success
Solution
Focused
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Manage
• Straticare Support
• Change Management
• 24/7 Operations
FOUNDATION OF THE
PCM CLOUD STRATEGY
FOUNDATION OF THE
PCM CLOUD STRATEGY Ongoing
Customer
Success
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Solution Alignment
• Collaboration and Productivity – Modern Workplace
• Data Center Transformation, Business Continuity,
Storage, Application Migration- Modern Infrastructure
• Data Visualization, and usage -Modern Data
• Top ERP solutions available as a Service
Solution
Focused
Cloud Resident
For customer deploying cloud based solutions –
90 day Architect on-site to assist select clients with
transitioning to the cloud with multiple disciplines.
Cloud Advisor –Regular monthly engagement with client
to help drive business initiatives with cloud technology.
Cloud Advisor
New Roles | New Focus
Managed Hybrid Cloud Support
FOUNDATION OF THE
PCM CLOUD STRATEGY
Transformational
Methodology
Platforms and
Partners
Solution
Focused
PCM Cloud
Strategy
FOCUSED ON CUSTOMER SUCCESS &
AN ENHANCED EXPERIENCE
Ongoing
Customer
Success
SECURITY FIRST
FOCUSED ON HELPING COMPANIES AT EVERY STAGE
Manage Security
Environment
Determine Current &
Target Scale
Assessment Security
Requirements
Communicate & Execute
your Roadmap
Develop Improvement
Plans
RIGHT NOW
For more information please contact your Account Representative or
Stephen.Moss@pcm.com Herb.Hogue@pcm.com Robert.Hall@pcm.com
today for Your Right Now solution.
Mobile
CloudSecure
The Mindset
of a Hacker
EARLY
DAYS
1990:
FIRST COMPUTER
1993:
FIRST TIME ON
THE INTERNET
1995:
PROGRAMMING
& HACKING
1997:
RECRUITED
BY TNT
1998-
1999:
DDOS
ATTACKS
A T T A C KE R
V I C T I
M
2000:
PROJECT
RIVOLTA
2000:
MARKET CRASH
$1.7 billiondollars in economic damage
2000:
THE
MANHUNT
2000:
THE AFTERMATH
HACKING TODAY
THE INSTITUTIONALIZATION
OF HACKING
EMPLOYEES
ARE THE
WEAKEST LINK
EMPLOYEES ARE THE WEAKEST LINK
EMERGING TECHNOLOGY
CREATING INCREASED RISK
BACK DOOR
LOCKED.
RONT DOOR
LOCKED.
RS
COME
THROU
GH
THE
PIPES
HP
SureStart
TAKEAWAYS
RIGHT NOW
SVP of Security Practice
Tuesday, November 6, 2017
Gary Miglicco
WRAP UP
SVP/GM of Inside Sales
Monday, November 6, 2017
Keith Joseph
Platinum & Gold Partner
Breakout sessions
Tech Expo 2:00-5:30
Cocktail Reception &
Attendee Gift Distribution
UP NEXT
#PCMVision Customer Day Presentation Slides

#PCMVision Customer Day Presentation Slides

  • 1.
    WELCOME TO PCM’s AlanLawrence President – PCMG-G Public Sector Bob Bogle Senior Vice President Field Sales West
  • 2.
    INVESTMENTS TO SUPPORTACCOUNT MANAGER AND CUSTOMERS CUSTOMER Face to Face Phone Digital Mobile ACCOUNT MANAGER Business Development Managers Engineers & Pre-Sales Support Professional Services Managed Services Microsoft & Software Service Delivery Advanced & Field STRATIFORM (Security & Cloud)
  • 3.
    MISSION FIRST • Servingthe needs of Public Sector Customers Worldwide for Nearly 30 Years • Federal Government (DoD, Civilian, Advanced Programs) • State and Local • Education (K-12 and Higher Ed) • System Integrators • Combine Commercial Products from leading Technology Manufacturers with Certified Engineer and Integration Service to Tailor Solutions for Each Customer • Wide Range of Federal, State and Local, and Contract Vehicles • Dedicated, Certified Acquisition and Program Management Team
  • 4.
    2017 marked amajor milestone for PCM We're celebrating 30 years as a trusted IT solutions provider! We started in garage and now a Global Fortune 1000 IT Solutions and Services Provider
  • 5.
    PCM’s SERVICES LEADERSHIP TEAM StephenMoss SVP, Services & Solutions Herb Hogue President, Stratiform David Hall SVP, Services
  • 6.
    MOBILE, CLOUD ANDSECURITY DIGITAL TRANSFORMATION IS NOW AN IMPERATIVE
  • 7.
    WHO IS PCM? MOBILEFIRST We live in a world of mobile technology but it’s not the technology that’s Mobile it’s the users. We assist customers with custom solutions in multiple form factors with unique applications, securely, with a complete managed experience. CLOUD FIRST An agnostic cloud approach to understanding a customers unique business and technical requirements leveraging our assess, implement, manage and enhance methodology to insure a seamless journey to the clouds. SECURITY FIRST A complete security methodology assessing security requirements, threat areas, business risk leveraging best of breed security technologies with the governance and processes to implement a comprehensive security architecture, identifying controls with the governance to manage them, and the capacity to remediate threats as the landscape changes. A HOLISTIC, COMPREHENSIVE SOLUTION COMPANY
  • 8.
    MOBILE FIRST FOCUSED ONALWAYS AVAILABLE ACCESS Workforce Anywhere • Any device – Anywhere • High, low and no touch options to transact your business • Secure access to data • Pocket to cloud enablement • Fleet and contingent workforce solutions Product Development • Tailored for customer experience • Application accessibility • Customized solutions • Custom packaging and delivery • Program management • Data acquisition for analytics Support Everywhere • Customer experience driven • Multi-lingual support • Global field services • Warehousing • Depot options • Disposal solutions • Full asset management
  • 9.
    MOBILE FIRST FOCUSED ONALWAYS AVAILABLE ACCESS All Rights Reserved for Customer Owned Images
  • 10.
    Don't worry aboutwhich Cloud partner provides your business with the best options. PCM partners with all of todays leading public cloud providers to design a solution that fits your business best. We also integrate with your premise private cloud solution. Transformation Methodology Ongoing Customer Success Solution Focused PCM Cloud Strategy FOUNDATION OF THE PCM CLOUD STRATEGY Platform and Partners FOCUSED ON HYBRID Your Cloud
  • 11.
    The PCM Completefor Cloud program gives every customer access to the Transformational Services, tools and resources needed at every step of the solution lifecycle. Assess • Envisioning Sessions • Solution Assessments • Plan & Roadmap Implement • Migration Services • Deployment Services • Adoption Services Enhance • Cloud Advisors • Cloud Residents Ongoing Customer Success Solution Focused Platform and Partners PCM Cloud Strategy Transformation Methodology Manage • Straticare Support • Change Management • 24/7 Operations FOUNDATION OF THE PCM CLOUD STRATEGY
  • 12.
    FOUNDATION OF THE PCMCLOUD STRATEGY Ongoing Customer Success Platform and Partners PCM Cloud Strategy Transformation Methodology Solution Alignment • Collaboration and Productivity – Modern Workplace • Data Center Transformation, Business Continuity, Storage, Application Migration- Modern Infrastructure • Data Visualization, and usage -Modern Data • Top ERP solutions available as a Service Solution Focused
  • 13.
    Cloud Resident For customerdeploying cloud based solutions – 90 day Architect on-site to assist select clients with transitioning to the cloud with multiple disciplines. Cloud Advisor –Regular monthly engagement with client to help drive business initiatives with cloud technology. Cloud Advisor New Roles | New Focus Managed Hybrid Cloud Support FOUNDATION OF THE PCM CLOUD STRATEGY Transformational Methodology Platforms and Partners Solution Focused PCM Cloud Strategy FOCUSED ON CUSTOMER SUCCESS & AN ENHANCED EXPERIENCE Ongoing Customer Success
  • 14.
    SECURITY FIRST FOCUSED ONHELPING COMPANIES AT EVERY STAGE Manage Security Environment Determine Current & Target Scale Assessment Security Requirements Communicate & Execute your Roadmap Develop Improvement Plans
  • 15.
    RIGHT NOW For moreinformation please contact your Account Representative or Stephen.Moss@pcm.com Herb.Hogue@pcm.com Robert.Hall@pcm.com today for Your Right Now solution. Mobile CloudSecure
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
    1998- 1999: DDOS ATTACKS A T TA C KE R V I C T I M
  • 23.
  • 24.
  • 25.
    $1.7 billiondollars ineconomic damage
  • 26.
  • 27.
  • 28.
  • 29.
  • 31.
  • 32.
    EMPLOYEES ARE THEWEAKEST LINK
  • 33.
  • 34.
  • 35.
  • 40.
  • 42.
  • 43.
    RIGHT NOW SVP ofSecurity Practice Tuesday, November 6, 2017 Gary Miglicco
  • 45.
    WRAP UP SVP/GM ofInside Sales Monday, November 6, 2017 Keith Joseph
  • 46.
    Platinum & GoldPartner Breakout sessions Tech Expo 2:00-5:30 Cocktail Reception & Attendee Gift Distribution UP NEXT

Editor's Notes

  • #5 VIDEO NEXT SLIDE
  • #18 Describe how your childhood influenced you and set you out on this journey Often alone due to parents being busy Obsession with puzzles, games and video games that were challenged. At the end of the day, you just like solving problems and creating solutions to challenges
  • #19 Anecdote about his father giving him his first computer Go into detail about How many hours you spent on the computer Talk about your fathers office and entertaining yourself with the computer What it felt like Why you liked it so much What were the first things you did on the computer
  • #20 Describe your first time on the internet Who introduced you, where you were, why you went on there in the first place Your initial thoughts And how your activities on the internet evolved
  • #21 Describe your humble beginnings, Your first exploits, the inspiration the results Your evolution in skill and the escalation of the severity of the hacking
  • #22 I was recruited my Russia’s top hacking group… a world reowned group called TNT Described how you were recruited What those first conversations were like Was there an initiation process, what was it? what happened next
  • #23 I was recruited my Russia’s top hacking group… a world renound group called TNT Described how you were recruited What those first conversations were like Was there an initiation process, what was it? what happened next
  • #24 Here’s the actual code that MafiaBoy used in his attack. Can we put this on an old school computer with some like weird ass coder looking font/treatment? Tools Used: Trinoo IMP.C TF2k Stacheldraht Describe what people are looking at and then in great detail explain the attack The idea/inspiration How you picked the targets How you did it Who the targets were (name 4-5) Did anyone in your personal life know you were going to do it Where you were How it felt
  • #25 You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered. Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety. People began to sell and my targets scrambled to regain credibility but it was too late. It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected. CLICK
  • #26 You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered. Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety. People began to sell and my targets scrambled to regain credibility but it was too late. It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected. CLICK
  • #28 Things to touch on: Family/friend reaction Juvenile detention Being released from Juvenile detention at reintegrating into society
  • #29 Reference the trailer – As I mentioned in the video a hacker’s arsenal is much more sophisticated today and so are their motivations.
  • #30 The first is the institutionalization of hacking. When I was hacking, it was about Exploration, pushing the status quo circumventing preset parameters – those motivations are still there but there is a completely different set of threats impacting organizations like yours.
  • #31 Today, it’s about Financial Gain, Ideology, Politics and Entertainment and these groups are much different from ones like I was a part of like TNT Today, they are often state sponsored, numbered businesses, organizations whose reputation is build on their ability to get results. These grandiose motivations, highly evolved collectives of talent hackers, you gets grandiose and complex attacks.
  • #32 Although everyone in this room is very cognizant of the threats that exist online – that every email, every link, every attachment is a potential threat – the truth of the matter is, we are the minority. Everyone organization that is represented in this room is made up almost entirely of employees who don’t think in terms of risk, who don’t see themselves as the target and act first and think later. 65% of all breaches happen from internal – people can’t resist. I know for a fact that this is what keeps you up at night.
  • #33 Those are the obvious examples but let me tell you about one of the more sophisticated social engineering tactics I’ve employed as a pen tester: Tell Car/Train story Thankfully for that client, this was only a test. But let me tell you about one of the most devastating attacks that came as the result of a simple phishing scam that shook the foundation of a multi-billion dollar company
  • #34 The internet of things revolution has made devices smarter, it’s made our lives easier but it’s also made us more susceptible than ever before to cyber attacks. And as more and more devices are added to our networks the time, energy and resources you’re able to dedicate to securing them is drawn thinner and thinner.
  • #35 For the last several years, we’ve been focused on securing the truly mobile devices that scale across our organizations: smart phones, tablets and laptops. I like to think of the analogy of focusing 90% of your efforts on those devices is like locking the front and back doors. The problem for organizations though is…. CLICK
  • #36 Hackers come through the pipes. While we’re talking about end points within this context, let’s dissect one in particular that is often overlooked but a huge red herring for many organizations. CLICK
  • #37 A few questions for the room: how many printers does your organization have in your fleet? If you asked any of the employees in your organization – do you think they would have a sense of what kind of information flows through your company printer every day? I am willing to bet, because I’ve had these conversations – the general perception is that printers are purely an output device, and aside from rare chance of paper being stolen from the tray – they aren’t a risk. We all know that if that printer is connected to the company network, that’s not true. CLICK
  • #38 What security protocols are currently managing your printer fleet? If you don’t know the answer or if the answer isn’t a robust list.  Let me ask you: if you suffered a breach through one of your printers.. would you know it happened and how long would it take you to find the breach? CLICK
  • #39 So we know hackers are looking for entry points to your organization that function more like pipes than front and back doors. And you have a fleet of printers that may not be overly secure. Ask yourself, can your organization stand to have a blind spot that large? I can tell you as someone who has been on both sides of this battleground between IT and cyber criminals that you cannot. CLICK
  • #40 Today, I work as a security consultant and penetration tester and as a result, I’ve heard the security spiel from every major technology company. And, I’ve also seen how exposed many of those companies are leaving their customers. We all see daily news headlines about data breaches and hacking, so of course technology companies will tout security as a product feature, but are they really bringing it to the core of their offering and bringing it across devices? In my experience, many are not.  As more and more connected PCs, Printers and other devices flood our networks and more and more data goes in transit, IT departments are scrambling to keep up – and the truth us, they can’t do it by themselves – they need help.   And that’s really what inspired me to begin working with HP. They aren’t just talking the talk, they’re walking the walk. I’ve had the opportunity to work with the HP labs team, and peak underneath the hood and can tell you that whether it’s PC or Print – HP is delivering best in class security solutions, at the device level – the sort of security based-automation and protection that today’s businesses need to ensure they’re protected, at all times.  But what do I mean about building in security technology at the device level? CLICK
  • #41 Security at the Firewall level, isn’t enough – because of extremely sophisticated attacks that are now happening below the firmware. On the PC side of things, let’s look at HPSureStart for example which protects against those attacks below firmware, at the BIOS level. SureStart protects against the attacks targeting the millions of lines of code before your operating system boots up and the firewall has an opportunity to engage and protect you. SureStart ensures that you’re protected from the moment you hit that power button. I can’t tell you how many end-users are being saved on a daily basis by features like this – amazing stuff. CLICK
  • #42 In terms of Print, let’s examine just one example of the tremendous enhancements in print security technology HP has championed. HP Runtime Intrusion Detection which constantly analyzes for malware attacks and any other inconsistencies. Sounds standard right? Well, what truly sets Runtime Intrusion Detection apart is its ability to identify, delete, self-heal and then reboot, automatically without the need for a service call. What IT department that you know of wouldn’t benefit from this self-detection and healing technology, it’s precisely to kind of safety nets today’s employees need to ensure they aren’t making mistakes online that could cost a business millions, without even knowing it. CLICK
  • #43 Today, we’ve discussed my story, and how much hacking has changed. The motivation, the techniques, the perpetrators and even the targeted devices.   We talked about how IT departments are often being tasked to do more with less – a difficult mandate when you consider the huge proliferation of sophisticated devices that are joining company networks everyday. And finally, we discussed what HP is doing to help the IT department shore up the defense against cyber-attacks at the device level, to create the layers of security required to protect your devices and provide the modern IT department with the necessary safety nets and detection protocol to act with quickness and efficiency when attacks do happen. I urge all of you to re-assess what is being done at the organizational, individual employee and device level to protect yourselves, before it’s too late. Thank you.
  • #44 DAY 2
  • #46 DAY 2
  • #47 DAY 2