Start
Entdecken
Suche senden
Hochladen
Einloggen
Registrieren
Anzeige
Check these out next
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
Summer internship - Cybersecurity
AbhilashYadav14
ICION 2016 - Cyber Security Governance
Charles Lim
It and-cyber-module-2
Marneil Sanchez
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
2016 - Cyber Security for the Public Sector
Scott Geye
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
1
von
24
Top clipped slide
The Cyber Security Landscape: An OurCrowd Briefing for Investors
27. May 2014
•
0 gefällt mir
2 gefällt mir
×
Sei der Erste, dem dies gefällt
Mehr anzeigen
•
4,109 Aufrufe
Aufrufe
×
Aufrufe insgesamt
0
Auf Slideshare
0
Aus Einbettungen
0
Anzahl der Einbettungen
0
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Melden
Business
Technologie
OurCrowd
Folgen
Founder, Editor-in-Chief at Tradestreaming um OurCrowd
Anzeige
Anzeige
Anzeige
Recomendados
Cyber Security Landscape: Changes, Threats and Challenges
Bloxx
938 Aufrufe
•
24 Folien
Cyber Security Needs and Challenges
Happiest Minds Technologies
4.1K Aufrufe
•
10 Folien
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
Nicolas Beyer
2.1K Aufrufe
•
22 Folien
Breaking down the cyber security framework closing critical it security gaps
IBM Security
4.6K Aufrufe
•
30 Folien
Understanding the Cyber Security Vendor Landscape
Sounil Yu
8.5K Aufrufe
•
22 Folien
Topic11
Anne Starr
75 Aufrufe
•
57 Folien
Más contenido relacionado
Presentaciones para ti
(20)
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
•
6.2K Aufrufe
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
•
59 Aufrufe
Summer internship - Cybersecurity
AbhilashYadav14
•
958 Aufrufe
ICION 2016 - Cyber Security Governance
Charles Lim
•
2.8K Aufrufe
It and-cyber-module-2
Marneil Sanchez
•
123 Aufrufe
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
•
1.4K Aufrufe
2016 - Cyber Security for the Public Sector
Scott Geye
•
498 Aufrufe
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
•
7.5K Aufrufe
Your cyber security webinar
Empired
•
535 Aufrufe
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security
•
3.2K Aufrufe
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
•
2.1K Aufrufe
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
•
2.3K Aufrufe
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
•
1.1K Aufrufe
Information Security vs IT - Key Roles & Responsibilities
Kroll
•
3K Aufrufe
Information security for dummies
Ivo Depoorter
•
11.7K Aufrufe
Thinking like a hacker - Introducing Hacker Vision
PECB
•
1.4K Aufrufe
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
•
235 Aufrufe
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
•
898 Aufrufe
The Future of Cybersecurity - October 2015
Security Innovation
•
1.5K Aufrufe
Introduction to Cybersecurity
Krutarth Vasavada
•
267 Aufrufe
Similar a The Cyber Security Landscape: An OurCrowd Briefing for Investors
(20)
Netwatcher Credit Union Tech Talk
NetWatcher
•
365 Aufrufe
Anatomy of a cyber attack
Mark Silver
•
7.2K Aufrufe
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
•
1.1K Aufrufe
Clinton- Cyber IRT Balto 10_2012
Don Grauel
•
672 Aufrufe
Why Are Investors Excited About Cyber Security Startups, Again?
OurCrowd
•
3.7K Aufrufe
C018131821
IOSR Journals
•
149 Aufrufe
Sec 280 entire course new
Laynebaril
•
102 Aufrufe
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Andris Soroka
•
1.2K Aufrufe
Exploring the Defender's Advantage
Raffael Marty
•
99 Aufrufe
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
•
1.5K Aufrufe
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
•
1.2K Aufrufe
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
•
1.5K Aufrufe
Dr K Subramanian
eletseditorial
•
390 Aufrufe
2014 the future evolution of cybersecurity
Matthew Rosenquist
•
2.8K Aufrufe
Current Trends in Cyber Crime 2015
Cybernetic Global Intelligence
•
990 Aufrufe
The New frontiers in Information Security
Vineet Sood
•
365 Aufrufe
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Inno Eroraha [NetSecurity]
•
85 Aufrufe
2015 Year to Date Security Trends
Terra Verde
•
973 Aufrufe
Corporate threat vector and landscape
yohansurya2
•
62 Aufrufe
Toward Continuous Cybersecurity With Network Automation
Ken Flott
•
234 Aufrufe
Anzeige
Más de OurCrowd
(20)
Everything You Need to Know about Preemptive Rights
OurCrowd
•
2.9K Aufrufe
[ACA webinar] Investor Experiences with Online Equity Platforms
OurCrowd
•
1.7K Aufrufe
Webinar: Q&A with XPRIZE and HeroX founders
OurCrowd
•
1.4K Aufrufe
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3
OurCrowd
•
4.3K Aufrufe
The Changing Relationship Between Investors and Investments
OurCrowd
•
4.2K Aufrufe
InvestHK and OurCrowd
OurCrowd
•
1.8K Aufrufe
FrieghtOS and OurCrowd
OurCrowd
•
2.2K Aufrufe
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...
OurCrowd
•
2.7K Aufrufe
Investment Trends: Where to invest your attention in 2015
OurCrowd
•
38.2K Aufrufe
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...
OurCrowd
•
2.2K Aufrufe
OurCrowd 2014 Year in Review
OurCrowd
•
805 Aufrufe
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...
OurCrowd
•
4.2K Aufrufe
The changing face of the American Investor: Tools, Advice, and Do It Yourself...
OurCrowd
•
4.3K Aufrufe
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech Scene
OurCrowd
•
11K Aufrufe
IPOs: How they work and what they mean for your portfolio
OurCrowd
•
1.7K Aufrufe
M&A and IPO Activity of Israeli companies, 1H 2014
OurCrowd
•
963 Aufrufe
Investing in fintech: Trends in financial technology for investors and entrep...
OurCrowd
•
18.2K Aufrufe
History of Online Investing
OurCrowd
•
1.3K Aufrufe
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the Moon
OurCrowd
•
664 Aufrufe
Cashing in - how to make money investing in startups
OurCrowd
•
5.1K Aufrufe
Último
(20)
【本科生、研究生】英国皇家音乐学院毕业证文凭购买指南
foxupud
•
0 Aufrufe
【本科生、研究生】荷兰内梅亨大学毕业证文凭购买指南
akuufux
•
0 Aufrufe
Document (6).docx
arlysotero
•
0 Aufrufe
PENAWARAN PRODUK.pptx
RehanKayana
•
2 Aufrufe
GBC dry fruits.pptx
UmarFarooq363559
•
0 Aufrufe
innovationentrepreneurship-230205174355-c5e1db02.pdf
LawalBelloDanchadi
•
0 Aufrufe
ECO3_ Assignment 2.docx
BrumsanPhan
•
0 Aufrufe
Assessment Group Managers Training-SMCC1.pptx
HctorMurciaForero
•
0 Aufrufe
A Comparative Study of Main Clauses in Project Delay Provisions in UK Constru...
Awais982055
•
0 Aufrufe
Money & Banking_8 Islamic Banking.pptx
Habibullah Qayumi
•
2 Aufrufe
The Advantage — Summer 2023
CBIZ, Inc.
•
0 Aufrufe
PPT 2.pptx
FaizaAkram16
•
0 Aufrufe
DOC-20230604-WA0010. (1).pdf
Sana340690
•
0 Aufrufe
【本科生、研究生】英国阿伯丁大学毕业证文凭购买指南
foxupud
•
0 Aufrufe
Content Creators for Good: A Brand Guide to Working with Influencers
Tara Nolan
•
0 Aufrufe
2.1 - Functions and Evolution of HRM (1).pptx
Dhjjvbn
•
2 Aufrufe
【本科生、研究生】美国奥克兰大学毕业证文凭购买指南
foxupud
•
0 Aufrufe
DM ppt.pdf
Tanmay921299
•
0 Aufrufe
【本科生、研究生】法国巴黎第八大学毕业证文凭购买指南
akuufux
•
0 Aufrufe
CALL CENTER TALKS
cbsepatrachar1
•
0 Aufrufe
Anzeige
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 1 The Cyber Security Landscape An OurCrowd Briefing Ron Moritz 27 May 2014
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Your hosts 2 Zack Miller Head of investor community @OurCrowd Ron Moritz Advisor, consultant and OurCrowd mentor
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. OurCrowd’s portfolio 3 Cyber Security companies in our portfolio
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. What is Cyber Security? § Cyber security – the evolution of a name - EDP controls à IT audit à IT security à computer security à network security à OT security à cyber security - Practices, tools and concepts dealing with CIA § CIA: confidentiality, integrity, and availability of information § But also CIA of systems, network communications, operations - Terminology and solutions often derived from defense industry § Cyber security includes offensive capabilities - The use of IT to respond to threats by attacking adversaries § Why spray RAID to kill what you see when you can spread ant honey that is carried back to the nest and destroys the colony? - Historically government domain, emerging enterprise capability § The dog in the night that has not yet barked? - Often likened to insurance, today compared to braking systems that enable high-performance cars to go faster 4
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Security Cycles & Investor Appetite: Generations of Cyber Security § Before the Web: early viruses, LANs, PCs, floppy disks - Limited access, isolated networks, slow propagation of threat § 1993: Mosaic and the rise of the commercial Internet (FUD 1.0) - First generation of program code travelling across the ‘net § 2000: dot-com bubble burst (double-digit sec spend as % of IT) - Most IT spend slowed but Internet on-ramp required cyber security § 2002: inflection point (FUD 1.5) - Global technology companies proclaim commitment to security (MSFT, CSCO, CA) § 2005: consumer Internet distraction - Web 2.0, the rise of social media, industrial disintermediation, $50K startups § 2008: global economic crash - No appetite for enterprise infrastructure solutions (IT budget squeeze) § 2011: media focus on all things cyber (FUD 2.0) - Plus emerging pressure from mobile personal device (smartphone) market § 2013: Snowden and the fragility of the Internet (anti-FUD?) - Risk becomes real, NSA disclosure become personal, Target breach impacts CxOs 5
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Two Real Cyber Security Drivers § Governments and corporations are under attack - Cyber hack problem is no longer simply a nuisance § litigation and criminal complaints based on weak systems of control and the lack of reasonable cyber security strategy - Snowden was sensational but NSA snooping was personal § validated and went beyond what experts thought was possible - 05/2014 DoJ China nation-state industrial espionage disclosure § aggressive government-sponsored electronic espionage against corporations (and other governments) § Direct impact on executive officer careers - Convergence of risk following Target, Niemen Marcus, and other well publicized breaches (impact broad, shockwaves resonate) - IT budgets again being freed-up for the development of new products, services which require strengthening of digital defenses 6
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Businesses Under Fire § Organizations are exposed more than ever - Increasing number and variety of threats and risks - New attacks - targeted and purposeful § Hackers are stealing around $250B/year in IP - NSA Director, Gen. Keith Alexander, calls these attacks "the greatest wealth transfer in history" § Significant YoY increases in cyber attacks - DHS reported a 68% increase in cyber attacks in 2012 at federal agencies, government partners, and against critical infrastructure - Symantec reported attacks on companies rose 42% in 2012 § U.S. government is increasing spending in cyber security (despite cuts elsewhere) 7
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Macro Cyber Security Topics § Cloud Computing: Data Center Security Redefined - Distributed Control, Ownership of Data Assets § Advanced Persistent Threats (Network & End-Point) - Detect and Contain Sophisticated and Targeted Attacks - Intelligence Dissemination and Threat Remediation § Mobility and Device Security - Secure Mobile Applications, Consumerization (BYOD) § Risk Management - Regulatory, Integrity, Compliance, Business Continuity, Social Media § Identity & Access Management - Authentication, Authorization, Access Control § Verticalization: Security with a Sector / Industry Focus - No longer one-size-fits all: industries (govt., healthcare, finserv, energy & utilities, oil & gas, manufacturing, education) are demanding solutions more attune with their unique challenges 8
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Gartner Nexus of Forces § Pervasive Access - mobile § Global Delivery - cloud § Big Context - information § Extreme Behavior - social 9 A tsunami of change rocking the IT world (David Cowen, Bessemer)
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Cyber Security Trends (1 of 3) § Enhanced use of encryption - more careful attention to the maintenance and proper configuration of existing encryption systems § Increased scrutiny of internal data use - behavioral analytic technologies to monitor users within the company as well as end users accessing company apps - increasing alerts (situational awareness) around suspicious behavior that accompanies theft or attack with malware § Resistance to cloud technology - huge rewards for companies and end users in terms of efficiency and access to both information and applications - offset by security liabilities that accompany cloud technology and create a drag on the speed of adoption (cybersec ≈ car brakes) 10
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Cyber Security Trends (2 of 3) § Risk assessment and software analysis - front-line (but back-office) defenses such as screening software for vulnerabilities, keeping software up-to-date (patched) to avoid known weaknesses, improved exercising of software - better engineering due to secure coding standards and practices § More destructive attacks - real damage to computer systems and stored data from targeted attacks launched by political and cause-focused hacktivist groups § Rising levels of smartphone malware - more security efforts directed to mobile platforms and biz apps § Phishing and hacking of individual users - access to account credentials while avoiding sophisticated enterprise security measures (people are the weakest link) 11
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Cyber Security Trends (3 of 3) § More sophisticated malware - better encryption of and more sophisticated malicious code allow attackers to evade virus detection and removal tools (AV dead?) § Active defense (honeypots and other traps) - to convince hackers that they are in their target area, when they’ve actually been diverted and trapped in a shell where they can be easily identified and in some cases, retaliated against § Threat follow up (MSSP ≈ Associated Press model) - requires manpower organizations don’t have so active monitoring and maintenance by MSSPs and external forensics experts § Fast response (security and threat intelligence)* - fraud tools and intelligence platforms to investigate, track and analyze events post-facto with near real-time clarity (e-forensics) and to make actionable information available to IT staff 12 *Security and threat intelligence is like teen sex …
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: A Concentration of Risk § New threat vectors once again an obstacle to Internet-fueled growth plans (mobile and cloud) - So cash is being thrown at possible solutions § Security is in the conversation at the board level - 80% of G2K reporting cyber security preparations to the board § Gartner estimates 39% increase in security spend: - From $67B (in 2013) to $93B (in 2017) § Makes cyber security ripe for the harvest - The 8.7% annual growth rate is compelling metric for investors § Cyberattack news onslaught is making a difference - VCs move quickly to fund startups that could solve problems discussed in cyberattack headlines 13
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: A Cyber Security Boom? § The cyber security market is in a renaissance - Estimated global investment in private cyber security companies: § 2011 cybersecurity funding was up 94% over 2010 § 2012 funding was estimated to have been $1.0B § In 2013, ~$1.5B was invested in ~240 cyber security startups § No end in sight - Likely in anticipation of a deal-making boom: § The average valuation for each VC round raised in 2013 rose by 41% over 2012 to $31.5 million § In comparison, the increase between 2011 and 2012 was 26% § Caveat emptor - Are we in or approaching a cyber security bubble? § Because cyber security private company valuations more than doubled in past two years, there is an uneasy feeling. § Demands exceptional diligence and the art of the long view 14
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: New Exit Opportunities § Mergers and Acquisitions (M&A) - 23 cyber security M&A deals in 2013, 9 in Q1 2014, 8 in Q2 2014 § Cisco ß NDS, ProofPoint ß Amortize Technologies, Blue Coat ß Solera Networks, Cisco ß Sourcefire ($2.7B or ~10x annual revenue), IBM ß Trusteer ($800M or ~10x annual revenue), Fireeye ß Mandiant ($1B) - Average cyber security enterprise value / revenue multiple of 9.9x § Impressive but will always be dwarfed by consumer internet and social media deals since cyber security growth and risk are lower § Initial Public Offering (IPO) - Palo Alto Networks, Imperva, Qualys, Baracuda, FireEye (hot $300M IPO in September 2013 with $5B market cap today), Varonis, Cyber- Ark (in process) § Private Equity Carve-Outs and Roll-Ups - $200M Insight (PE) bet on Airwatch (2013) followed by $1.5B VMWare acquisition (2014) 15
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: A Fragmented Market § No dominant leader - There is no single enterprise with a large enough share of the market to be able to influence the industry’s direction § Symantec and McAfee, the two biggest players in the industry, are followers and not leaders; they have been unable to influence - An acquisitive growth strategy that will position one company to dominate the industry, like Cisco in the 1990s, remains a possibility § The increasing variety of threats … - Requires rapid innovation and short development cycles § a challenge for bigcos and an opportunity for nimble startups who can carve out a market niche via unique products and services § Coddling via cyber-security focused initiatives - Mach37 Cybersecurity Accelerator (Virginia) - JVP National Cybersecurity Incubator (BGU, Beer Sheva) - Cisco Israel Cybersecurity Incubator (John Chambers, May 2013) - Lockheed Martin and GE cyber security R&D centers in Israel 16
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. On Cyber Security M&As § Multiples are at all-time high - Big players must buy revenue growth through acquisitions - M&A activity will remain high (energize brands, buy mkt. share) § Money pouring in but a VC pull-back is possible - Not likely in the near term but probable as value plays dry up - Great “A” tech but limited execution capability in “B” teams § IPO option open but consolidation will continue - Hackers thwart legacy solutions forcing innovation acquisitions - With limited growth-stage funding available, M&A activity jumps § M&A drivers - Integrated software suite leaders in need of innovation - Evolving platforms such as software-defined data centers - Online (cloud) service providers creating new security challenges - Non-traditional acquirers (outside or adjacent spaces or eco-system) 17
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Expertise Counts: Finding the Winners § Domain expertise is key (for investors and buyers) - Does the team have deep backgrounds in the sector? - Do they understand how customers bought software in the past? - Do they know how they are buying now (the buying cycle)? - Do they understand how and what channels work? - Do they grasp the intricacies of and how pricing models work? - Do they know how to listen to customers and prioritize features? § Does the team really know its vertical market? - How many people really understand healthcare and cloud technology and how to roll that out? - Do they understand their position in and are they attuned to nuances of and know how to leverage their eco-system? - What do they know about their target customer and buyer and how to access them? - Do they really understand and value their competitors and do they have a legitimate “break-out” plan? 18
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Pre-Submitted Questions § What was the process to funding regarding traction of an idea and or product? - Entrepreneur team commitment and full engagement: is this an “A” team? - Pitch review (new venture business plan outline): is this an “A” opportunity? - Initial meetings (phone, face-to-face) and vetting of team: can they execute? - Term sheet enables deep-dive (technical due diligence): is the solution real? - Customer (or prospect) and independent expert validation: is the market real? - Finally, is this something that can be explained clearly and is it exciting? § How were the first customers captured? - Street-fighting: Typically entrepreneurs leverage personal networks to secure initial meetings and lock-in a sponsor or champion § What level of funding are they raising and what is the use of funds? - If they’ve validated the solution and market and secured early adopters then funds are typically for sales and marketing in the United States and $3M is the recommended minimum gunpowder (above and beyond cost of maintaining existing operations) - If they’ve not yet validated then $250K to $500K will typically allow them to develop early prototypes, secure development partners, and validate some basic assumptions (first milestone) 19
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Ron’s Radar § Encryption – it is time yet? - Secure communication – the need is not universal but timing is relevant: Silent Circle (Zimmerman’s PGP reboot)*, Wikr (message self-destruction), Threema (encrypted What’s App) - Protecting the data inside the cloud and in transit – security, policy carried w/data (Vaultive, Porticor, Covertix) § Cloud-based security services – enabling the cloud - Easier to deploy, cheaper to manage, code is always up-to-date - Correlation of data from multiple incidents (SumoLogic, CTCH) - Web site security and acceleration (Fireblade) § Threat intelligence – needle in the haystack - Cylance, ThreatMetrix and Seculert are examples § Fraud-prevention – sensor-supported policies - Transaction decisions based on more than user ID and password like geo-location input (XYVerify) and continuous authentication of users throughout transaction session (BioCatch) - Device fingerprinting/reputation and big-data analysis (Iovation) 20 *Just raised $30M to develop a “blackphone”
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Big Data will Revolutionize the Future of Cyber Security § Big data offers intelligence-driven models - Analytics will play key role in detecting crime, security infractions § Big data analytics à Bigger threat map = TMI - Enables enterprises to combine and correlate external and internal information to better assess threats to them and their industry § Data analysis evolution enables advances in predictive capabilities and real-time decision automation - Moving closer to precognition (science imitates art: “Minority Report”) - Gartner claims that by 2016, more than 25% of global firms will adopt big data analytics for at least one security and fraud detection use case (such as detection of advanced threats, insider threats and account takeover) up from current 8% § Big data will change most of the product categories in the field of computer security (but we’re in the early days) - Impact on all existing solutions (conventional firewalls, anti-malware, data loss prevention, network monitoring, authentication and authorization of users, identity management, fraud detection, systems of governance, risk and compliance, etc.) - Disruption creates all sorts of opportunities for emerging tech companies - Result is ongoing industry fragmentation, no dominant market share leader 21
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. “Character is much easier kept than recovered” § Security still a knee-jerk reaction to an attack - Spend not correlated to revenue (or direct expense reduction) - BYOD as an example § IT infra security still a one-time, ad hoc effort - But more security is now embedded within daily operations § Security as a broad collection of technologies - Still not an inherent, proactive and continual aspect of governance § Cybersecurity never gets solved - Like an antibiotic-resistant bacteria: attackers adapt to defenses and render them obsolete (David Cowen, Bessemer) 22 Thomas Paine, US patriot & political philosopher (1737 - 1809)
The Cyber Security
Landscape An OurCrowd Briefing Ron Moritz Managing Director, MTC Venture Consulting +972 72 272 4450 +1 650 618 9560 Ron@Moritz.US @RonMoritz http://www.il.linkedin.com/in/ronmoritz/
Copyright ©2014 MTC.
All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Questions about OurCrowd 24 Any Questions? For feedback or more information: Zack@ourcrowd.com https://www.ourcrowd.com/
Anzeige