SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Creating IT-Security Start-Ups
Benjamin Rohé,
Founding Managing Director
Sorry for the Layout
•  It had to be that way !
Market, Predictions and Examples
Investors Perspective
Cyber Security Startups?
Cyber Security Startup!!
•  Generations of Cyber Security
1993: Mosaic and the rise of the commercial Internet (FUD* 1.0)
•  2000: dot-com bubble burst (double-digit security spend as %IT)
- 2002: inflection point (FUD* 1.5)
•  2005: consumer Internet distraction & 2008: economic crash
•  2011: media focus on all things cyber (FUD* 2.0)
•  2013: Snowden and the fragility of the Internet (anti-FUD*?)
•  2015: ?
•  2020: ???
•  * Acronym for fear, uncertainty and doubt. It is a marketing term that is often used to cast a shadow over a competitor's product when your own is unable to
compete. FUD is a technique used by larger companies who have a large market share. The FUD acronym was first freely defined by Gene Amdahl after he left
IBM to found his own company, Amdahl Corp, with this statement: "FUD is the fear, uncertainty, and doubt that IBM sales people instill in the minds of potential
customers who might be considering Amdahl products."
No crystal ball is required to predict
that high-profile security breaches
will continue to make
the news in 2015
Two Real Cyber Security Drivers
•  Governments and corporations are under attack
from cyber hacks (no longer simply a nuisance)
•  IT budgets are being freed up for products and
services to strengthen digital defenses (convergence
of risk)
Businesses Under Fire
•  Hackers are stealing around $250B/year in IP - NSA
Director, Gen. Keith Alexander, calls these attacks "the greatest wealth
transfer in history“
  "Significant YoY increases in cyber attacks
DHS reported a 68% increase in cyber attacks in 2012 at federal
agencies, government partners, and against critical infrastructure -
Symantec reported attacks on companies rose 42% in 2012
•  U.S. government is increasing spending in Cyber
Security (despite cuts elsewhere)
Business Under Fire
Money Follows Problems
•  Driving investment in innovative technologies
- $391M in just 16 companies between Jan 2012 and Sep 2013:
•  Cyber Security market is in a renaissance: -
–  $1B invested in Cyber Security startups in 2012
–  up 5% over 2011 (vs. overall venture funding down 10% YoY)
–  2011 Cyber Security funding was up 94% over 2010
Security Predictions For 2015
Security predictions
from: Blue Coat,
Damballa, FireEye,
Fortinet, Forrester,
Gartner, IDC,
ImmuniWeb, Kaspersky
Lab, Lancope, McAfee,
Neohapsis, Sophos,
Symantec, Trend Micro,
Varonis Systems,
Websense. Image:
Charles McLellan/
ZDNet
Exit Opportunities for Founders
and Investors
•  Mergers and Acquisitions (M&A)
–  Cisco <- Sourcefire ($2.7B or ~10x annual revenue)
–  IBM <- Trusteer ($800M or ~10x annual revenue)
•  Initial Public Offerings (IPOs)
•  Private Equity etc
Intelligence Services:
Key Investors1
•  106 Startups Who Received Investment from
the C.I.A* Since 1999 In-Q-Tel has been
strategically investing in startup companies
that are used by the intelligence community.
•  Today, these companies have amassed more
than $3.2 Billion in venture funding, and
employ more than 7,000 people.
Case-Study: One Of The Most Prominent
Intelligence Financed Startups
As of 2013, Palantir was used by at least 12 groups within the US
Government including the CIA, DHS, NSA, FBI, the CDC, the
Marine Corps, the Air Force, Special Operations Command, West
Point, the Joint IED-defeat organization and Allies, the Recovery
Accountability and Transparency Board and the National Center
for Missing and Exploited Children.
https://www.youtube.com/watch?v=VJFk8oGTEs4
Palantir Facts
•  Founded in 2004 by Peter Thiel, Joe Lonsdale, Alex Karp, Stephen Cohen,
Nathan Gettings; 1.500+ employees;
•  Palantir Gotham is used by counter-terrorism analysts at offices in the
United States Intelligence Community and United States Department of
Defense, fraud investigators at the Recovery Accountability and Transparency
Board, and cyber analysts at Information Warfare Monitor. Palantir Metropolis is
used by hedge funds, banks, and financial services firms.
•  CEO Alex Karp announced in 2013 that the company would not be pursuing
an IPO, as going public would make “running a company like ours very difficult.”
•  As of early 2014 the company was valued at $9 billion, according to Forbes,
with the magazine further explaining that the valuation made Palantir "among
Silicon Valley’s most valuable private technology companies.
Global Cyber Security Spending to
Reach $76.9 Billion in 2015: Gartner
•  According to the IT research and advisory firm, global
IT security spending reached $71.1 billion in 2014
year, an increase of 7.9% compared to 2013. 2015,
spending will grow even more, reaching $76.9 billion
(+8,2%)
•  By 2015, approximately 10% of the security controls
deployed by organizations will be cloud-based,
particularly when it comes to small and midsize
businesses.
J.P. Morgan CEO: Cyber-Security
Spending To Double!
•  J.P. Morgan Chase & Co. Chairman and Chief
Executive James Dimon said the bank would double
spending on cyber security over the next five years.
3 Solid Tips From Founders
Of a Security Startup2
•  To scale a startup too early or grow too quickly is not necessarily a good thing,
especially for enterprise startups. Things will go wrong, bugs will be revealed, and the
unexpected will always surprise you at the most inconvenient of times. Being slow and
steady at first allows time to optimise the advertising funnel and learn how to push
customers down the funnel effectively with a small budget. Don’t ramp up the model until
the conversion is consistently great.
•  When attending business meetups and events, seek to build business relationships,
and genuinely help people to ‘pay it forward’. Many startup founders meet to sell their
idea, or to pitch. No one will be interested in buying from you or use your product if you
directly sell to them when meeting the first time.
•  At the end of the day, a startup is a business, so think of revenue early and have a
solid business model, not just to build something cool or change the world. Don’t run out
of cash, because the longer the business can survive, the greater its chance of succeeding
and ultimately changing the world.
Reaching Out to the Growing
Community (Examples)
https://angel.co/cyber-security
2014 surveys and annual reports
Publisher Title
Appriver Global Security Report: End-of-year report 2014
Cisco 2015 Annual Security Report
CyberEdge Group 2014 Cyberthreat Defense Report
Damballa/Ponemon The Cost of Malware Containment
EY Global Information Security Survey 2014: Get Ahead of
Cybercrime
Forrester Understand the State of Network Security: 2014 to 2015
HP/Ponemon 2014 Global Report on the Cost of Cyber Crime
Lumension/Ponemon State of the Endpoint Report 2015
Radware Global Application and Security Report 2014
SafeNet/Ponemon The Challenges of Cloud Information Governance: A Global
Data Security Study
Symantec 2014 Internet Security Report
Tripwire/Atomic Enterprise of Things
http://www.zdnet.com/article/cybersecurity-in-2015-what-to-expect/
Case Study: Steganos
4 Key Products …
.. For a Post-Snowden World
Growing a Cyber Security Company
with Success
•  B2C:
–  PR: own the subject
(steganos: snowden/
data privacy)
–  Affiliate Marketing
(blogs, (software)publisher,
software review magazines)
•  B2B: Partner
distribution &
bundles; bottom-up
approach (used at the
bottom of the organization,
becomes “standard” within the
entire organization)
Affiliate Marketing (B2C)
http://www.startupnation.com/articles/affiliate-marketing-101-understanding-the-basics/
Closing the Loop
•  Expertise Counts
–  Domain expertise is key (for investors and buyers)
–  Does the team really know its vertical market?
Closing the Loop
•  Government Cyberwarfare & CIP
–  More than 80 companies work with the NSA on
cyberwarfare and surveillance (Der Spiegel)
–  Claims that U.S. National Security Agency is
funding “digital Blackwater” and “cyber Raytheon”
Final Remarks
•  Security still a reflex reaction to an attack
•  IT infrastructure security still a one-time, ad hoc effort
•  Security as a broad collection of technologies
•  Cyber Security never gets solved
Like an antibiotic-resistant bacteria: attackers
adapt to defenses and render them obsolete
(David Cowen, Partner at Bessemer Ventures)
Contact Information
Benjamin Rohé
br@gtec.berlin
+491739751021
www.gtec.berlin
References
1.  https://mattermark.com/106-startups-who-received-investment-from-the-c-i-a-most-
frequent-in-q-tel-co-investors/
2.  http://fromlittlethings.co/2013/10/09/three-solid-tips-from-founders-of-security-startup-
authopay/

Weitere ähnliche Inhalte

Was ist angesagt?

2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 

Was ist angesagt? (20)

The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 

Andere mochten auch

2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
Ethan S. Burger
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
barbeejl
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Andere mochten auch (20)

2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
 
Rogers Russ Hacking A Terror Network
Rogers Russ   Hacking A Terror NetworkRogers Russ   Hacking A Terror Network
Rogers Russ Hacking A Terror Network
 
Ht f42
Ht f42Ht f42
Ht f42
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
On Cyber
On Cyber  On Cyber
On Cyber
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Go-to-market strategy for tech startups
Go-to-market strategy for tech startupsGo-to-market strategy for tech startups
Go-to-market strategy for tech startups
 
Developing your go to market strategy by Kris Konrath, Convergent
Developing your go to market strategy by Kris Konrath, Convergent Developing your go to market strategy by Kris Konrath, Convergent
Developing your go to market strategy by Kris Konrath, Convergent
 
Segmentation, Value proposition & Go-to-market approach
Segmentation, Value proposition & Go-to-market approachSegmentation, Value proposition & Go-to-market approach
Segmentation, Value proposition & Go-to-market approach
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market Strategy
 

Ähnlich wie NATO Cyber Security Conference: Creating IT-Security Start-Ups

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
Charmaine Servado
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
 

Ähnlich wie NATO Cyber Security Conference: Creating IT-Security Start-Ups (20)

IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money men
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
Publish and be damned
Publish and be damned Publish and be damned
Publish and be damned
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 

Mehr von Benjamin Rohé

From school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable techFrom school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable tech
Benjamin Rohé
 
International entrepreneurship culture in berlin
International entrepreneurship culture in berlinInternational entrepreneurship culture in berlin
International entrepreneurship culture in berlin
Benjamin Rohé
 
Failure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friendFailure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friend
Benjamin Rohé
 

Mehr von Benjamin Rohé (14)

From school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable techFrom school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable tech
 
weXelerate: corporate innovation and other disasters - benjaminrohe.com
weXelerate: corporate innovation and other disasters -  benjaminrohe.comweXelerate: corporate innovation and other disasters -  benjaminrohe.com
weXelerate: corporate innovation and other disasters - benjaminrohe.com
 
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
 
Data - the new oil #data #oil #technology #future
Data - the new oil #data #oil #technology #futureData - the new oil #data #oil #technology #future
Data - the new oil #data #oil #technology #future
 
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
 
International entrepreneurship culture in berlin
International entrepreneurship culture in berlinInternational entrepreneurship culture in berlin
International entrepreneurship culture in berlin
 
Entrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
Entrepreneurship 3.0 - The 3rd Wave of Industrial RevolutionEntrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
Entrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
 
Start-Ups + Mittelstand = Success!
Start-Ups + Mittelstand = Success!Start-Ups + Mittelstand = Success!
Start-Ups + Mittelstand = Success!
 
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
 
SCHEITERN und aufstehen #WEBINALE 2011 Berlin
SCHEITERN und aufstehen #WEBINALE 2011 BerlinSCHEITERN und aufstehen #WEBINALE 2011 Berlin
SCHEITERN und aufstehen #WEBINALE 2011 Berlin
 
Failure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friendFailure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friend
 
Why worry? Life as an Entrepreneur.
Why worry? Life as an Entrepreneur. Why worry? Life as an Entrepreneur.
Why worry? Life as an Entrepreneur.
 
How to value your tech startup
How to value your tech startupHow to value your tech startup
How to value your tech startup
 
Seed funding
Seed fundingSeed funding
Seed funding
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

NATO Cyber Security Conference: Creating IT-Security Start-Ups

  • 1. Creating IT-Security Start-Ups Benjamin Rohé, Founding Managing Director
  • 2.
  • 3. Sorry for the Layout •  It had to be that way !
  • 6. Cyber Security Startups? Cyber Security Startup!! •  Generations of Cyber Security 1993: Mosaic and the rise of the commercial Internet (FUD* 1.0) •  2000: dot-com bubble burst (double-digit security spend as %IT) - 2002: inflection point (FUD* 1.5) •  2005: consumer Internet distraction & 2008: economic crash •  2011: media focus on all things cyber (FUD* 2.0) •  2013: Snowden and the fragility of the Internet (anti-FUD*?) •  2015: ? •  2020: ??? •  * Acronym for fear, uncertainty and doubt. It is a marketing term that is often used to cast a shadow over a competitor's product when your own is unable to compete. FUD is a technique used by larger companies who have a large market share. The FUD acronym was first freely defined by Gene Amdahl after he left IBM to found his own company, Amdahl Corp, with this statement: "FUD is the fear, uncertainty, and doubt that IBM sales people instill in the minds of potential customers who might be considering Amdahl products."
  • 7. No crystal ball is required to predict that high-profile security breaches will continue to make the news in 2015
  • 8. Two Real Cyber Security Drivers •  Governments and corporations are under attack from cyber hacks (no longer simply a nuisance) •  IT budgets are being freed up for products and services to strengthen digital defenses (convergence of risk)
  • 9. Businesses Under Fire •  Hackers are stealing around $250B/year in IP - NSA Director, Gen. Keith Alexander, calls these attacks "the greatest wealth transfer in history“   "Significant YoY increases in cyber attacks DHS reported a 68% increase in cyber attacks in 2012 at federal agencies, government partners, and against critical infrastructure - Symantec reported attacks on companies rose 42% in 2012 •  U.S. government is increasing spending in Cyber Security (despite cuts elsewhere)
  • 11. Money Follows Problems •  Driving investment in innovative technologies - $391M in just 16 companies between Jan 2012 and Sep 2013: •  Cyber Security market is in a renaissance: - –  $1B invested in Cyber Security startups in 2012 –  up 5% over 2011 (vs. overall venture funding down 10% YoY) –  2011 Cyber Security funding was up 94% over 2010
  • 12. Security Predictions For 2015 Security predictions from: Blue Coat, Damballa, FireEye, Fortinet, Forrester, Gartner, IDC, ImmuniWeb, Kaspersky Lab, Lancope, McAfee, Neohapsis, Sophos, Symantec, Trend Micro, Varonis Systems, Websense. Image: Charles McLellan/ ZDNet
  • 13. Exit Opportunities for Founders and Investors •  Mergers and Acquisitions (M&A) –  Cisco <- Sourcefire ($2.7B or ~10x annual revenue) –  IBM <- Trusteer ($800M or ~10x annual revenue) •  Initial Public Offerings (IPOs) •  Private Equity etc
  • 14. Intelligence Services: Key Investors1 •  106 Startups Who Received Investment from the C.I.A* Since 1999 In-Q-Tel has been strategically investing in startup companies that are used by the intelligence community. •  Today, these companies have amassed more than $3.2 Billion in venture funding, and employ more than 7,000 people.
  • 15. Case-Study: One Of The Most Prominent Intelligence Financed Startups As of 2013, Palantir was used by at least 12 groups within the US Government including the CIA, DHS, NSA, FBI, the CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint IED-defeat organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children.
  • 17. Palantir Facts •  Founded in 2004 by Peter Thiel, Joe Lonsdale, Alex Karp, Stephen Cohen, Nathan Gettings; 1.500+ employees; •  Palantir Gotham is used by counter-terrorism analysts at offices in the United States Intelligence Community and United States Department of Defense, fraud investigators at the Recovery Accountability and Transparency Board, and cyber analysts at Information Warfare Monitor. Palantir Metropolis is used by hedge funds, banks, and financial services firms. •  CEO Alex Karp announced in 2013 that the company would not be pursuing an IPO, as going public would make “running a company like ours very difficult.” •  As of early 2014 the company was valued at $9 billion, according to Forbes, with the magazine further explaining that the valuation made Palantir "among Silicon Valley’s most valuable private technology companies.
  • 18. Global Cyber Security Spending to Reach $76.9 Billion in 2015: Gartner •  According to the IT research and advisory firm, global IT security spending reached $71.1 billion in 2014 year, an increase of 7.9% compared to 2013. 2015, spending will grow even more, reaching $76.9 billion (+8,2%) •  By 2015, approximately 10% of the security controls deployed by organizations will be cloud-based, particularly when it comes to small and midsize businesses.
  • 19. J.P. Morgan CEO: Cyber-Security Spending To Double! •  J.P. Morgan Chase & Co. Chairman and Chief Executive James Dimon said the bank would double spending on cyber security over the next five years.
  • 20. 3 Solid Tips From Founders Of a Security Startup2 •  To scale a startup too early or grow too quickly is not necessarily a good thing, especially for enterprise startups. Things will go wrong, bugs will be revealed, and the unexpected will always surprise you at the most inconvenient of times. Being slow and steady at first allows time to optimise the advertising funnel and learn how to push customers down the funnel effectively with a small budget. Don’t ramp up the model until the conversion is consistently great. •  When attending business meetups and events, seek to build business relationships, and genuinely help people to ‘pay it forward’. Many startup founders meet to sell their idea, or to pitch. No one will be interested in buying from you or use your product if you directly sell to them when meeting the first time. •  At the end of the day, a startup is a business, so think of revenue early and have a solid business model, not just to build something cool or change the world. Don’t run out of cash, because the longer the business can survive, the greater its chance of succeeding and ultimately changing the world.
  • 21. Reaching Out to the Growing Community (Examples) https://angel.co/cyber-security
  • 22. 2014 surveys and annual reports Publisher Title Appriver Global Security Report: End-of-year report 2014 Cisco 2015 Annual Security Report CyberEdge Group 2014 Cyberthreat Defense Report Damballa/Ponemon The Cost of Malware Containment EY Global Information Security Survey 2014: Get Ahead of Cybercrime Forrester Understand the State of Network Security: 2014 to 2015 HP/Ponemon 2014 Global Report on the Cost of Cyber Crime Lumension/Ponemon State of the Endpoint Report 2015 Radware Global Application and Security Report 2014 SafeNet/Ponemon The Challenges of Cloud Information Governance: A Global Data Security Study Symantec 2014 Internet Security Report Tripwire/Atomic Enterprise of Things http://www.zdnet.com/article/cybersecurity-in-2015-what-to-expect/
  • 25. .. For a Post-Snowden World
  • 26.
  • 27. Growing a Cyber Security Company with Success •  B2C: –  PR: own the subject (steganos: snowden/ data privacy) –  Affiliate Marketing (blogs, (software)publisher, software review magazines) •  B2B: Partner distribution & bundles; bottom-up approach (used at the bottom of the organization, becomes “standard” within the entire organization)
  • 29. Closing the Loop •  Expertise Counts –  Domain expertise is key (for investors and buyers) –  Does the team really know its vertical market?
  • 30. Closing the Loop •  Government Cyberwarfare & CIP –  More than 80 companies work with the NSA on cyberwarfare and surveillance (Der Spiegel) –  Claims that U.S. National Security Agency is funding “digital Blackwater” and “cyber Raytheon”
  • 31. Final Remarks •  Security still a reflex reaction to an attack •  IT infrastructure security still a one-time, ad hoc effort •  Security as a broad collection of technologies •  Cyber Security never gets solved Like an antibiotic-resistant bacteria: attackers adapt to defenses and render them obsolete (David Cowen, Partner at Bessemer Ventures)