introduction about the cyber security startup landscape, what are the drivers, why businesses and governments need to act, some predictions for 2015 and beyond, investment market and Palantir mini-case-study, market growth, 3 startup tips from founders, some references and additional material
6. Cyber Security Startups?
Cyber Security Startup!!
â˘âŻ Generations of Cyber Security
1993: Mosaic and the rise of the commercial Internet (FUD* 1.0)
â˘âŻ 2000: dot-com bubble burst (double-digit security spend as %IT)
- 2002: inflection point (FUD* 1.5)
â˘âŻ 2005: consumer Internet distraction & 2008: economic crash
â˘âŻ 2011: media focus on all things cyber (FUD* 2.0)
â˘âŻ 2013: Snowden and the fragility of the Internet (anti-FUD*?)
â˘âŻ 2015: ?
â˘âŻ 2020: ???
â˘âŻ * Acronym for fear, uncertainty and doubt. It is a marketing term that is often used to cast a shadow over a competitor's product when your own is unable to
compete. FUD is a technique used by larger companies who have a large market share. The FUD acronym was first freely defined by Gene Amdahl after he left
IBM to found his own company, Amdahl Corp, with this statement: "FUD is the fear, uncertainty, and doubt that IBM sales people instill in the minds of potential
customers who might be considering Amdahl products."
7. No crystal ball is required to predict
that high-profile security breaches
will continue to make
the news in 2015
8. Two Real Cyber Security Drivers
â˘âŻ Governments and corporations are under attack
from cyber hacks (no longer simply a nuisance)
â˘âŻ IT budgets are being freed up for products and
services to strengthen digital defenses (convergence
of risk)
9. Businesses Under Fire
â˘âŻ Hackers are stealing around $250B/year in IP - NSA
Director, Gen. Keith Alexander, calls these attacks "the greatest wealth
transfer in historyâ
⯠"Significant YoY increases in cyber attacks
DHS reported a 68% increase in cyber attacks in 2012 at federal
agencies, government partners, and against critical infrastructure -
Symantec reported attacks on companies rose 42% in 2012
â˘âŻ U.S. government is increasing spending in Cyber
Security (despite cuts elsewhere)
11. Money Follows Problems
â˘âŻ Driving investment in innovative technologies
- $391M in just 16 companies between Jan 2012 and Sep 2013:
â˘âŻ Cyber Security market is in a renaissance: -
â⯠$1B invested in Cyber Security startups in 2012
â⯠up 5% over 2011 (vs. overall venture funding down 10% YoY)
â⯠2011 Cyber Security funding was up 94% over 2010
13. Exit Opportunities for Founders
and Investors
â˘âŻ Mergers and Acquisitions (M&A)
â⯠Cisco <- Sourcefire ($2.7B or ~10x annual revenue)
â⯠IBM <- Trusteer ($800M or ~10x annual revenue)
â˘âŻ Initial Public Offerings (IPOs)
â˘âŻ Private Equity etc
14. Intelligence Services:
Key Investors1
â˘âŻ 106 Startups Who Received Investment from
the C.I.A* Since 1999 In-Q-Tel has been
strategically investing in startup companies
that are used by the intelligence community.
â˘âŻ Today, these companies have amassed more
than $3.2 Billion in venture funding, and
employ more than 7,000 people.
15. Case-Study: One Of The Most Prominent
Intelligence Financed Startups
As of 2013, Palantir was used by at least 12 groups within the US
Government including the CIA, DHS, NSA, FBI, the CDC, the
Marine Corps, the Air Force, Special Operations Command, West
Point, the Joint IED-defeat organization and Allies, the Recovery
Accountability and Transparency Board and the National Center
for Missing and Exploited Children.
17. Palantir Facts
â˘âŻ Founded in 2004 by Peter Thiel, Joe Lonsdale, Alex Karp, Stephen Cohen,
Nathan Gettings; 1.500+ employees;
â˘âŻ Palantir Gotham is used by counter-terrorism analysts at offices in the
United States Intelligence Community and United States Department of
Defense, fraud investigators at the Recovery Accountability and Transparency
Board, and cyber analysts at Information Warfare Monitor. Palantir Metropolis is
used by hedge funds, banks, and financial services firms.
â˘âŻ CEO Alex Karp announced in 2013 that the company would not be pursuing
an IPO, as going public would make ârunning a company like ours very difficult.â
â˘âŻ As of early 2014 the company was valued at $9 billion, according to Forbes,
with the magazine further explaining that the valuation made Palantir "among
Silicon Valleyâs most valuable private technology companies.
18. Global Cyber Security Spending to
Reach $76.9 Billion in 2015: Gartner
â˘âŻ According to the IT research and advisory firm, global
IT security spending reached $71.1 billion in 2014
year, an increase of 7.9% compared to 2013. 2015,
spending will grow even more, reaching $76.9 billion
(+8,2%)
â˘âŻ By 2015, approximately 10% of the security controls
deployed by organizations will be cloud-based,
particularly when it comes to small and midsize
businesses.
19. J.P. Morgan CEO: Cyber-Security
Spending To Double!
â˘âŻ J.P. Morgan Chase & Co. Chairman and Chief
Executive James Dimon said the bank would double
spending on cyber security over the next five years.
20. 3 Solid Tips From Founders
Of a Security Startup2
â˘âŻ To scale a startup too early or grow too quickly is not necessarily a good thing,
especially for enterprise startups. Things will go wrong, bugs will be revealed, and the
unexpected will always surprise you at the most inconvenient of times. Being slow and
steady at first allows time to optimise the advertising funnel and learn how to push
customers down the funnel effectively with a small budget. Donât ramp up the model until
the conversion is consistently great.
â˘âŻ When attending business meetups and events, seek to build business relationships,
and genuinely help people to âpay it forwardâ. Many startup founders meet to sell their
idea, or to pitch. No one will be interested in buying from you or use your product if you
directly sell to them when meeting the first time.
â˘âŻ At the end of the day, a startup is a business, so think of revenue early and have a
solid business model, not just to build something cool or change the world. Donât run out
of cash, because the longer the business can survive, the greater its chance of succeeding
and ultimately changing the world.
21. Reaching Out to the Growing
Community (Examples)
https://angel.co/cyber-security
22. 2014 surveys and annual reports
Publisher Title
Appriver Global Security Report: End-of-year report 2014
Cisco 2015 Annual Security Report
CyberEdge Group 2014 Cyberthreat Defense Report
Damballa/Ponemon The Cost of Malware Containment
EY Global Information Security Survey 2014: Get Ahead of
Cybercrime
Forrester Understand the State of Network Security: 2014 to 2015
HP/Ponemon 2014 Global Report on the Cost of Cyber Crime
Lumension/Ponemon State of the Endpoint Report 2015
Radware Global Application and Security Report 2014
SafeNet/Ponemon The Challenges of Cloud Information Governance: A Global
Data Security Study
Symantec 2014 Internet Security Report
Tripwire/Atomic Enterprise of Things
http://www.zdnet.com/article/cybersecurity-in-2015-what-to-expect/
27. Growing a Cyber Security Company
with Success
â˘âŻ B2C:
â⯠PR: own the subject
(steganos: snowden/
data privacy)
â⯠Affiliate Marketing
(blogs, (software)publisher,
software review magazines)
â˘âŻ B2B: Partner
distribution &
bundles; bottom-up
approach (used at the
bottom of the organization,
becomes âstandardâ within the
entire organization)
29. Closing the Loop
â˘âŻ Expertise Counts
â⯠Domain expertise is key (for investors and buyers)
â⯠Does the team really know its vertical market?
30. Closing the Loop
â˘âŻ Government Cyberwarfare & CIP
â⯠More than 80 companies work with the NSA on
cyberwarfare and surveillance (Der Spiegel)
â⯠Claims that U.S. National Security Agency is
funding âdigital Blackwaterâ and âcyber Raytheonâ
31. Final Remarks
â˘âŻ Security still a reflex reaction to an attack
â˘âŻ IT infrastructure security still a one-time, ad hoc effort
â˘âŻ Security as a broad collection of technologies
â˘âŻ Cyber Security never gets solved
Like an antibiotic-resistant bacteria: attackers
adapt to defenses and render them obsolete
(David Cowen, Partner at Bessemer Ventures)