UNITED STATES

SECURITIES AND EXCHANGE COMMISSION

Washington, D.C. 20549

 

 

 

FORM 6-K

 

 

 

REPORT OF FOREIGN PRIVATE ISSUER

PURSUANT TO SECTION 13A-16 OR 15D-16

UNDER THE SECURITIES EXCHANGE ACT OF 1934

 

For the month of March 2023

 

Commission File Number: 001-41634

 

 

 

HUB Cyber Security Ltd.

(Exact Name of Registrant as Specified in Its Charter)

 

 

 

17 Rothschild Blvd

Tel Aviv 6688120, Israel

+972-3-924-4074

(Address of principal executive offices)

 

 

 

Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F.

 

Form 20-F  x            Form 40-F  ¨

 

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1):  ¨

 

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7):  ¨

 

 

 

 

 

 

CONTENTS

 

As previously announced on March 21, 2023, HUB Cyber Security Ltd. (the “Company”) plans to hold an online investor event on March 28, 2023 at 10:00 a.m. EST

 

Registration for the event is available through the link below:

 

https://hubsecurity-io.zoom.us/webinar/register/4316799910948/WN_zxCMcah2T_WEK3fImZ8Dtw

 

In conjunction with the investor event, the Company is furnishing a copy of the slide presentation that provides supplemental information regarding the Company’s business and strategy, which will be referenced during such event. A copy of the presentation is furnished hereto as Exhibit 99.1 and is incorporated by reference herein.

 

The information in this Report on Form 6-K, including in Exhibit 99.1 attached hereto is being furnished and shall not be deemed “filed” for the purposes of Section 18 of the Securities Exchange Act of 1934, as amended (the “Exchange Act”), or otherwise subject to the liabilities of that section, nor shall it be deemed incorporated by reference in any filing made by the Company under the Securities Act of 1933, as amended, or the Exchange Act, except as otherwise set forth herein or as shall be expressly set forth by specific reference in such a filing.

 

 

 

 

EXHIBIT INDEX

 

Exhibit No.   Description
   
99.1   Presentation dated March 28, 2023.

 

 

 

 

SIGNATURES

 

Pursuant to the requirements of the Securities Exchange Act of 1934, as amended, the registrant has duly caused this report to be signed on its behalf by the undersigned hereunto duly authorized.

 

  Hub Cyber Security Ltd.
     
Date: March 28, 2023 By: /s/ Uzi Moskovich
    Uzi Moskovich
    Chief Executive Officer

 

 

 

Exhibit 99.1

 

HUB Security Investor s Presentation March 2023

 

 

Disclaimer Page 2 This investor presentation (this “Presentation”) is for informational purposes only to assist interested parties in making their own evaluation with respect to HUB Cyber Security Ltd . (the “Company” or “Hub”) and for no other purpose . This Presentation does not constitute a offer to sell, a solicitation of an offer to buy, or a recommendation to purchase, any securities in any jurisdiction of the Company or any of its affiliates , (ii) a consent or authorization of any sale, issuance or transfer of any securities in any jurisdiction where, or to any person to whom, such offer, solicitation or sale may be unlawful under the laws of such jurisdiction or ( ii i ) a recommendation or advice regarding any securities in any jurisdiction . You should not construe the contents of this Presentation, or any prior or subsequent communications from or with the Company or i t s affiliates or representatives, as legal, tax, accounting or investment advice or a recommendation . You should consult your own counsel and tax and financial advisors as to legal and related matters concerning the matters described herein, and, by accepting this Presentation, you confirm that you are not relying upon the information contained herein to make any decision . The distribution of this Presentation may also be restricted by law and persons into whose possession this Presentation comes should inform themselves about and observe any such restrictions . The recipient acknowledges that it is ( i ) aware that the United States securities laws prohibit any person who has material, non - public information concerning a company from purchasing or selling securities of such company or from communicating such information to any other person under circumstances in which it is reasonably foreseeable that such person is likely to purchase or sell such securities, and (ii) familiar with the Securities Exchange Act of 1934 , as am ended, and the rules and regulations promulgated thereunder (collectively, the “Exchange Act”), and that the recipient will neither use, nor cause any third party to use, this Presentation or any information contained herein in contravention of the Exchange Act, including, without limitation, Rule 10 b - 5 thereunder . None of the Company or its subsidiaries, shareholders , affiliates, representatives, partners, directors, officers, employees, advisers or agents makes any representation or warranty, express or implied, as to the accuracy, completeness or reliability of the information contained in this Presentation . To the fullest extent permitted by law, in no circumstances will the Company or any of its subsidiaries, shareholders , affiliates, representatives, partners, directors, officers, employees, advisers or agents be responsible or liable for any direct, indirect or consequential loss or loss of profit arising from the use of this Presentation, its contents (including the internal economic models), its omissions, reliance on the information contained within it, or on opinions communicated in relation thereto or otherwise arising in connection therewith . The information contained herein does not purport to be all - inclusive or to contain all of the information that may be required to make a full analysis of the Company . Recipients of this Presentation should each make their own evaluation of the Company and of the relevance and adequacy of the information and should make such other investigations as they deem necessary . Forward - Looking Statements This Presentation contains forward - looking statements for purposes of the safe harbor provisions under the United States Private Securities Litigation Reform Act of 1995 , including statements about the anticipated benefits of the transaction, and the financial condition, results of operations, earnings outlook and prospects of the combined company . Forward - looking statements are typically identified by words such as "plan," "believe," "expect," "anticipate," "intend," "outlook," "estimate," "future," "forecast," "project," "continue," "could," "may," "might," "possible," "potential," "predict," "seem," "should," "will," "would" and other similar words and expressions, but the absence of these words does not mean that a statement is not forward - looking . The forward - looking statements are based on the current expectations of the management of HUB, as applicable, and are inherently subject to uncertainties and changes in circumstances and their potential effects and speak only as of the date of such statement . There can be no assurance that future developments will be those that have been anticipated . These forward - looking statements involve a number of risks, uncertainties or other assumptions that may cause actual results or performance to be materially different from those expressed or implied by these forward - looking statements . These risks and uncertainties include, but are not limited to, those discussed and identified in public filings made with the SEC by the HUB and the following : ( i ) expectations regarding HUB's strategies and future financial performance, including its future business plans or objectives, prospective performance and opportunities and competitors, revenues, products and services, pricing, operating expenses, market trends, liquidity, cash flows and uses of cash, capital expenditures, and HUB's ability to invest in growth initiatives and pursue acquisition opportunities ; (ii) the outcome of any legal proceedings that may be instituted against the combined company ; (iii) the ability to meet stock exchange continued listing standards ; (iv) the risk that the consummation of the business combination disrupts HUB's current operations and future plans ; (v) the ability to recognize the anticipated benefits of the transaction, which may be affected by, among other things, competition, the ability of HUB to grow and manage growth profitably, maintain relationships with customers and suppliers and retain its management and key employees ; (vi) costs related to the transaction ; (vii) limited liquidity and trading of HUB’s securities ; (viii) geopolitical risk, including military action and related sanctions, and changes in applicable laws or regulations ; (ix) the possibility that HUB may be adversely affected by other economic, business, and/or competitive factors ; (x) inaccuracies for any reason in the estimates of expenses and profitability and projected financial information for HUB ; and (xi) other risks and uncertainties set forth in the section entitled "Risk Factors" and "Cautionary Note Regarding Forward - Looking Statements" in HUB’s final proxy statement/prospectus filed on December 5 , 2022 . Should one or more of these risks or uncertainties materialize or should any of the assumptions made by the management of HUB prove incorrect, actual results may vary in material respects from those expressed or implied in these forward - looking statements . All subsequent written and oral forward - looking statements addressed in this Presentation and attributable to HUB or any person acting on their behalf are expressly qualified in their entirety by the cautionary statements contained or referred to in this Presentation . Except to the extent required by applicable law or regulation, HUB undertakes no obligation to update these forward - looking statements to reflect events or circumstances after the date of this Presentation to reflect the occurrence of unanticipated events . Industry and Market Data The information, data and statistics contained in this Presentation are derived from various internal (including data that the Company have internally collected) and external third - party sources . While the Company believes such third - party information is reliable, there ca n be no assurance as to the accuracy or completeness of the indicated information . The Company has not independently verified the accuracy or completeness of the information provided by third party sources . No representation is made, by the Company’s management, as to the reasonableness of the assumptions made within or the accuracy or completeness of any projections or modelling or any other information contained herein . Any information, data or statistics on past performance or modelling contained herein is not an indication as to future performance . The Company assumes no obligation to update the information in this Presentation . Trademarks The Company owns or have rights to various trademarks, service marks and trade names that it uses in connection with the operation of its business . This Presentation may also contain trademarks, service marks, trade names and copyrights of third - parties, which are the property of their respective owners . The use or display of third - parties’ trademarks, service marks, trade names or products in this presentation is not intended to, and does not imply, a relationship with the Company, or an endorsement or sponsorship by or of the Company . Solely for convenience, the trademarks, service marks, trade names and copyrights referred to in this presentation may appear without the TM, SM, ®or ©symbols, but such references are not intended to indicate in any way that the Company will not assert to the fullest extent under applicable law their respective rights or the rights of the applicable licensor(s) to these trademarks, service marks, trade names and copyrights .

 

 

In this session Opening Introducing HUB 1. What we do? 2. The market opportunity 3. Our products 4. The business model 5. Why Nasdaq? 6. Our Investor Relations (IR) strategy

 

 

Opening The purpose of this session is to engage with our new investors on Nasdaq post our move from the Tel Aviv Stock Exchange and introduce our company, strategy, products and technology. We intend to have a continues and open channel of communication and transparency with the investment community as our business develops and strategy unfolds.

 

 

Confidential computing allows data to remain encrypted even as it’s being processed and used in applications 5

 

 

The Problem Prevalent Data Security Model Protection in Transit Protection at Rest Protection in Use Securing data being stored by encrypting it before storing it or encrypting the device itself Securing data transmitted between networks using end - to - end encryption or by using encrypted connections Protecting data by securing the processing environment while it is being used in the RAM or processor for computation Current security models adequately mitigate risks involved with storage and transmission of data but fail to address risks of exposing data while being processed C ybersecurity solutions today address data protection when in a rest state (e.g. hard drive storage) or in communication transit (e.g. sent by mail or other means over the internet). Confidential information remains totally exposed when in actual use by the applications on the computer.

 

 

The Solution Protection in Transit Protection at Rest Protection in Use Securing data being stored by encrypting it before storing it or encrypting the device itself Securing data transmitted between networks using end - to - end encryption or by using encrypted connections Protecting data by securing the processing environment while it is being used in the RAM or processor for computation HUB’s confidential computing allows data to remain encrypted even as it’s being processed and used in applications. This provides a solution that assumes “zero trust”, that systems have already been hacked and administrators cannot be trusted. Holistic data security model Emerging security models encourage the adoption of a comprehensive protection model that mitigates ris k s across the data lifecycle from transmission to storage and usage, which can be achieved through confidential computing

 

 

7 Market Leadership confidentialcomputing.io Leading and accelerating Confidential Computing adoption via open collaboration between industry leaders, as members of the C onfidential C omputing consortium • Platform abstraction for Trusted Execution Environments (TEEs) enabling creating and running “ private, fungible, serverless ” applications Consortium projects • Open - source framework that allows developers to build Trusted Execution Environment (TEE) applications using a single enclaving abstraction • Open - source project for building trusted execution environments (TEE) with secure hardware enclaves, based on the RISC - V architecture Page 8

 

 

Confidential Computing represents the future of cybersecurity. The total addressable market (TAM) is nearly $4B today and expected to reach $54 billion by 2026 at a CAGR of 95% - 100% Confidential Computing Research © 2021, Everest Global, Inc $ 2 $ 4 $7 $14 $27 $54 $- $10 $20 $30 $40 $50 $60 $4B Confidential Computing TAM $1B U.S. TOM Market is growing at approximately 2 x per year, driven by move to zero trust environments Potential Market Opportunity

 

 

FULL STACK PROTECTION Complete protection of the user environment assets residing on the Secure Compute Platform. Using a ‘digital twin’ to enforce tight controls while never exposing these assets to the external world Hardened hardware and hardware - based network firewall Isolated hardware - based administration interface, access control, user and permission management via REST APIs Internal hardware secure module and key management services High - performance CPUs capable of running any virtualization environment. Accelerators that particular applications demand HUB Security seeks to redefine traditional cybersecurity with scalable Confidential C omputing platforms, leveraging a new zero trust paradigm with the goal of providing security and privacy for the most sensitive organizational applications and data

 

 

Confidential Compute Services Professional Services Annual subscription of Confidential Computing Services. Recurring revenues subscription model(with possible one - time CAPEX charge for on - premise solutions): Cyber security related services to support the Confidential Computing business including: • Security Assessments • System Integration • Security Training • Red Teams • Penetration Testing 01 02 Business Model

 

 

Our Core Solutions 2 1 HUB Enterprise Cloud and On - Premise confidential computing solutions. Superior cyber defense for enterprises and governments HUB Silicon An IoT cyber defense on - chip solution (CDOC) for Home security cameras, connected mobility, mobile phones etc. Existing products Under planning for 2024 commercialization

 

 

Product Portfolio 48 U Powerhouse Enterprise Server Rack Unit 1 U, 2 U & 4 U Enterprise Server Module PCI Card Module For integration with Edge Computing and Distributed AI - computing hubs HUB Silicon For IoT devices (Roadmap)

 

 

And many others Routes to market • Channel sales via VARs • Direct sales for the intelligence sensitive government projects • Direct sales for cutting - edge technology pilots with governments and global enterprises Primary target sectors • Banking • Insurance • Healthcare • Telecom • Governments HUB ’ Professional Services arm has a recognizable brand in the cyber security market and is a trusted partner to many of the world ’ s largest companies and agencies Professional Services Arm We intend to leverage these valuable clients for introductions of our novel Confidential Computing products

 

 

Why Nasdaq • We have migrated from the Tel Aviv Stock Exchange to Nasdaq to get more exposure to the U.S. cyber analysts and investment community • Our stock trading volumes already represent a massive increase from our trading on TASE • We target government and enterprise clients in the insurance and banking arena – most of which are U.S. based • We seek to provide our shareholders and potential investors with the credibility and transparency required of a Nasdaq listed company to promote better access to U.S. and global government and enterprise cyber tenders

 

 

HUB IR Strategy 1. Continuous engagement with institutional and retail investors 2. Full transparency on HUB’s business and future plans 3. Building company news - flow on Confidential Computing contracts and partnerships 4. Increasing company coverage by trade and market analysts 5. Ongoing non - deal roadshows and social engagement building retail and institutional investor awareness to our company and stock

 

 

Summary • HUB is a frontrunner in Confidential Computing cyber defense • Confidential Computing is a multibillion - dollar market growing at 95 % - 100 % CAGR • HUB believes that it is well positioned with its technology to potentially become a significant player in the Confidential Computing arena • We have the technology and the team to drive vision • HUB has become a publicly listed company in the U.S. traded on Nasdaq in order to attempt to leverage its advantage to grow its U.S. and global business • HUB plans to continue and host sessions such as this aimed to drive awareness to our business within the investment community

 

 

Thank you.