Preventing the spread of cyber-attacks in organizations There are hundreds of Cyber Systems on the market, but all of them together do not provide complete protection against the spread of cyber-attacks in an organization. Therefore, from time to time, we witness reports of organizations that have been attacked. What we do The Cyber 2.0 system prevents the spread of cyber-attacks in the organizational network. The problem we solve Malicious software will always penetrate the first computer in the organization. However, the primary damage is the spread of the malicious software within the network. The standard process in the cyber world First, cyber companies are required to identify 100% of the attacks (Detection), and then they try to block the identified attacks from spreading in the organizational network (Prevention). Why the standard solution is not complete The Detection process: Identifying every new software (0-day) is impossible, since new malware emerges at any moment. Cyber defenses operate in principle on a Black List basis. The inability to detect all attacks increases with the development of AI-based cyber-attacks, which can replicate each virus thousands of times, with each replication making a minor change. The Prevention process: Companies, by definition, cannot block the programs they did not identify in the Detection process. In addition, the hackers who control the infected computer will remove any protection software that exists on it, which will allow the attack to spread throughout the organization. Our advantages over others: The Detection process: We are not required to detect any malware. We only define which programs are allowed to move on the network. Everything that has not been defined as such, including any new software (malicious or not), and any new AI-based mutations - will be blocked. We operate according to the Zero-Trust principle. The Prevention process: Contrary to the conventional method, we do not prevent malware from leaving the infected computer. In fact, we do the opposite: we actually allow it to leave freely. On the other hand, on the programs that have been defined as programs that are allowed to move on the network, we apply a mathematical extrapolation of port scrambling. Our blocking is carried out only on the computers to which the malicious software was sent. Any (unauthorized) software for which the scrambling on exit has not been activated, will be blocked on the computer to which it was sent. Accordingly, any malicious software will exit the infected computer without interference, whether our system runs on it (and, according to our method, does not block its exit) or the hackers have removed the system, it will be blocked on the receiving computer because it exited without interference. The model we based on: As a rule, the cyber world is based on biological models (hence the terminology - virus, antivirus, mutations, injections). These models can be hacked, because attackers also work on the basis of these models, so hackers will always be one step ahead, just like viruses and new mutations in the biological field. We work on the basis of mathematical chaos theory, which cannot be hacked (even we cannot hack it), and therefore, we will always be one step ahead. The success of the system is proven The hacker challenge - starting in 2018, thousands of hackers around the world are trying to attack the system. We announced a reward of $ 100,000 for whoever succeeds, but so far - no one has succeeded. Patents - The company has registered 9 unique patents. Professional recognition: Cyber 2.0 was named the best cyber protection system by Frost and Sullivan for 2024. Israel's Ministry of Energy and infrastructures published a report stating: "Cyber 2.0 demonstrated its ability to protect PLC controllers in a critical manufacturing environment, when the system was in a protected state. With the protection mechanisms activated, the attack failed, and the facility remained functional." In the US, the NIST (National Institute of Standards and Technology) also approved our solution, after it underwent their careful examination. The result - for no Cyber 2.0 customer, even if attacked by a cyber-attack, the attack failed to spread within the organization. Cyber 2.0 stopped its spread. The systems we protect IT networks - business networks, servers, end stations. OT Networks - Critical infrastructure such as industrial control systems, cameras and controllers. IoT Networks - Protecting every component that transmits information within the network, from cameras to sensors and more. ******************************* List of patents • Unique Scrambling System- chaos engine (approved US 9,838,368, US 10,313,318) • Unique Server Support System (approved US 9,794,277, US 9,985,981, US 10,333,956) • Reverse Tracking Technology System (approved US 10,616,231) • Creating multiple Vlans without the use of hardware (approved US 10,397,196) • Unique Gateway System (submitted) • Reverse Chaos for employees who work at home (submitted) • Rendering Reverse Engineering ineffective (in process) • Automatic creation of dynamic lists (in process) • Chaos SSL (in process). Among our customers Seaports: Port of Salonika (Greece) and Ashdod Port (Israel). In the process: Texas (USA), NY (USA), and Port of Barcelona (Spain). Water corporations: The Houston Water Corporation (USA), Texas Water (USA), Mekorot (Israel National Water Co), and over thirty large water corporations in Israel. In the process: Three water corporations in Romania and one in the Philippines. Critical infrastructures and energy facilities: The Curiosity Lab in Atlanta (USA), CenaGas (Mexico), Enerser (Mexico), Ministry of Energy and Infrastructure (Israel), and Rapak Energy (Israel). Defense bodies: Beit Shemesh Motors (a manufacturer of aircraft engines, Israel), and Knafit (a manufacturer of aircraft wings, Israel). In the process: The Ministry of Internal Security in Butsouna. Municipal authorities: The municipalities in Atlanta (USA), and over 100 municipal authorities in Israel. Hospitals: The Kim Hospital chain, the Fernandez Hospital chain, the Kingsway Hospital (India) and The Center for Mental Health (Israel). Transportation: Israel routes. Airports: In the process: Kentucky Airport —CVG (USA) in cooperation with the Bird Foundation, the Israel Airports Authority, and Boeing (USA). Factories: Carlsberg (Uzbekistan), Green Holdings (Poland), and dozens of companies in Israel. Newspapers: Maariv, The Jerusalem Post, and Walla (Israel). The Team Hertzel Ozer - Founder & Chairman - CEO & Chairman of the Board of Several large companies such as HOT Telecommunication System, and the founder of AllJobs (a leading company). Erez Kaplan Haelion - Founder & CTO - A Committee member of the International Organizations of ISO standardization (Cyber), and Senior Advisor of Microsoft. Sneer Rozenfeld - CEO - An experienced sales veteran with over 23 years of experience in sales marketing and opening new markets Major Gen. (Res.) Professor Isaac Ben-Israel- The initiator of the National Cyber Authority at the prime minister's office in Israel and the Head of the Cyber Center at Tel Aviv University. (A member of our advisory board) Professor Bryson R. Payne- Ph.D., GPEN, CEH, CISSP - Director, Center for Cyber Operations Education, and Professor, Department of Computer Science and Information Systems at the University of North Georgia. (A member of our advisory board).