Why Are Investors Excited About Cyber Security Startups, Again?
|
|
|
- Ross Goodwin
- 10 years ago
- Views:
Transcription
1 Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October
2 Again? Generations of Cybersecurity : Mosaic and the rise of the commercial Internet (FUD 1.0) : dot-com bubble burst (double-digit security spend as %IT) : inflection point (FUD 1.5) : consumer Internet distraction : global economic crash : media focus on all things cyber (FUD 2.0) : Snowden and the fragility of the Internet (anti-fud?) Two Real Cybersecurity Drivers - Governments and corporations are under attack from cyber hacks (no longer simply a nuisance) - IT budgets are being freed up for products and services to strengthen digital defenses (convergence of risk) 2
3 Businesses Under Fire Hackers are stealing around $250B/year in IP - NSA Director, Gen. Keith Alexander, calls these attacks "the greatest wealth transfer in history" Significant YoY increases in cyber attacks - DHS reported a 68% increase in cyber attacks in 2012 at federal agencies, government partners, and against critical infrastructure - Symantec reported attacks on companies rose 42% in 2012 U.S. government is increasing spending in cybersecurity (despite cuts elsewhere) 3
4 Gartner Nexus of Forces Pervasive Access -mobile Global Delivery -cloud Big Context -information Extreme Behavior -social A tsunami of change rocking the IT world (David Cowen, Bessemer) 4
5 Concentration of Risk New threat vectors once again an obstacle to Internet-fueled growth plans (mobile and cloud) - So cash is being thrown at possible solutions Security is in the conversation at the board level - 80% of G2K reporting cyber security preparations to the board Gartner estimates 39% increase in security spend: - From $67B (in 2013) to $93B (in 2017) Makes cybersecurity ripe for the harvest - The 8.7% annual growth rate is compelling metric for investors Cyberattack news onslaught is making a difference - VCs move quickly to fund startups that could solve problems discussed in cyberattack headlines 5
6 Money Follows Problems Driving investment in innovative technologies - $391M in just 16 companies between Jan 2012 and Sep 2013: AnchorFree ($52M) Bit9 ($25.8M) Bromium ($26.5M) CipherCloud ($30M) CrowdStrike ($26M) Cylance ($15) Cyphort ($7M) Cyvera ($11M) Endgame ($23M) FireEye ($50M) Mocana ($25M) Nok Nok Labs ($15M) Shape Security ($20M) Skyhigh Networks ($20M) Veracode ($30M) Vormetric ($15M) Cybersecurity market is in a renaissance: - $1B invested in cybersecurity startups in 2012 Up 5% over 2011 (vs. overall venture funding down 10% YoY) 2011 cybersecurity funding was up 94% over
7 And New Exit Opportunities Mergers and Acquisitions (M&A) - Cisco NDS - ProofPoint Amortize Technologies - Blue Coat Solera Networks - Cisco Sourcefire ($2.7B or ~10x annual revenue) - IBM Trusteer ($800M or ~10x annual revenue) Initial Public Offering (IPO) - Palo Alto Networks - Qualys - FireEye (hot $300M IPO in September 2013) Private Equity Carve-Outs and Roll-Ups - $200M investment in Airwatch (aggregation strategy) 7
8 Making Cybersecurity a Top-of- Mind Investment Category Cloud computing is and will remain one of the most attractive destinations for entrepreneurs, technologists, and investors - It opens enormous vulnerabilities on the Internet, but it also presents great opportunity for innovative cybersecurity (David Cowen, Bessemer) VCs are sniffing for cybersecurity, again, asking - Can you get me to an IPO and show me a billion dollar return? Private company valuations doubled+ in two years New Cyber-Focused Accelerators / Incubators - Mach37 Cybersecurity Accelerator (Virginia) - JVP National Cybersecurity Incubator (BGU, Beer Sheva) - Cisco Israel Cybersecurity Incubator (John Chambers, May 2013) 8
9 A Note on Shifting Sand The venture industry is very good at adapting - Money that flowed into the consumer Internet market until 2011 mostly dried up in 2012 and Current focus is on enterprise solutions helping the enterprise cope with Gartner s nexus of forces - Exits like Waze, IPOs like Wix, and new investment in startups like Webydo, suggest the cycle in consumer will happen again - But current money (and VC partner talent) is still trying to pivot into the enterprise space as indicated by the new activity (buzz) Enterprise companies are long-lasting value plays - Consumer IPOs (Zynga, Facebook, LinkedIn) are exciting while enterprise IPOs are not (get drowned out) - But, on average, enterprise IPO companies have appreciated about 30% to 40% after the IPO in the last 10 years while consumer IPO companies have dropped a similar amount 9
10 Where Regulations Matter Focus on regulated industries - The hotbed of the next wave of SaaS Life sciences (health care, research) Financial services industry (insurance, banking) Cloud is a great opportunity in regulated markets - clear path of who is doing what (identity management) - version management (code control) by the vendor - security and access protocols managed properly and done right central multi-tenured architecture not compromised by multiple customized software solutions valid across all locations Security not as a competitive advantage but as an enabler of the nexus of forces 10
11 Expertise Counts Domain expertise is key (for investors and buyers) - Does the team have deep backgrounds and really understand how customers bought software in the past, how they re going to buy it now, what channels work, what pricing models work, what features should be given first, second, and third? Does the team really know its vertical market? - How many people really understand healthcare and cloud technology and how to roll that out? 11
12 Government Cyberwarfare & CIP More than 80 companies work with the NSA on cyberwarfare and surveillance (Der Spiegel) - Unique role for private sector defending a nation in cyberspace - Potential for conflict between mission and financial drivers Claims that U.S. National Security Agency is funding digital Blackwater and cyber Raytheon - Private suppliers of technology, intelligence, and talent Blackwater (a private military company, now Academi) Raytheon (defense contractor and military equipment maker) - Private suppliers of offensive (and defensive) cybersecurity Endgame Shape ManTech International HB Gary 12
13 Ron s Radar 13 Encryption it is time yet? - Silent Circle (Zimmerman s PGP reboot) and Wikr (message selfdestruction) need is not universal but good timing - Protecting the data inside the cloud and in transit (Vaultive, Dark Matter Labs, Porticor, CipherCloud) security carried with data Cloud-based security services enabling the cloud - Easier to deploy, cheaper to manage, code is always up-to-date - Correlation of data from multiple incidents (SumoLogic, CTCH) Threat Intelligence needle in the haystack - Cylance, ThreatMetrix and Seculert are examples Fraud-prevention sensor-supported policies - Transaction decisions based on more than user ID and password (like geo-location input from XYVerify) - Device fingerprinting/reputation and big-data analysis (Iovation)
14 Character is much easier kept than recovered Thomas Paine, US patriot & political philosopher ( ) Security still a knee-jerk reaction to an attack - Spend not correlated to revenue (or direct expense reduction) - BYOD as an example IT infra security still a one-time, ad hoc effort - But more security is now embedded within daily operations Security as a broad collection of technologies - Still not an inherent, proactive and continual aspect of governance Cybersecurity never gets solved - Like an antibiotic-resistant bacteria: attackers adapt to defenses and render them obsolete (David Cowen, Bessemer) 14
15 Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat
OurCrowd Startup Investing Guide: Cybersecurity
OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.
Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing
Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with
A Love Affair: Cyber Security, Big-data and Risk
A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31 Security what s at stake On average, organizations
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
CFIR - Finance IT 2015 Cyber security September 2015
www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
Security & privacy in the cloud; an easy road?
Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands [email protected] THE SHIFT O L D W O R L D
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
Brochure More information from http://www.researchandmarkets.com/reports/3301109/
Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),
Cybersecurity's Money Men
Amanda Jones About PR O F I L E S Cybersecurity's Money Men By Katie Benner Jan. 21, 2014 08:01 AM PST https://www.theinformation.com/cybersecuritys-money-men 1/14 Mounting data and national security threats
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
The Need for Intelligent Network Security: Adapting IPS for today s Threats
The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Locked Shields 2013. Kaur Kasak 24 Sept 2013
Locked Shields 2013 Kaur Kasak 24 Sept 2013 Disclaimer: This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and is designed to provide an independent position.
Raytheon and Vista Equity Partners form new cybersecurity company
Raytheon and Vista Equity Partners form new cybersecurity company Investor Presentation April 20, 2015 Dial In Number 866.825.3209 Domestic 617.213.8061 International Reservation Number: 48245306 Replay
Cyber Security for Start-ups: An Affordable 10-Step Plan
SESSION ID: ECO-W03 Cyber Security for Start-ups: An Affordable 10-Step Plan David Cowan Partner Bessemer Venture Partners @davidcowan Acknowledgements Startups don't like friction to get their job done.
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Palo Alto Networks. September 2014
Palo Alto Networks September 2014 Safe harbor This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro Background Liwei Ren Research interests Data security & privacy, network security analysis Data compression, math modeling &
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Enabling HR service delivery
Enabling HR service delivery Cloud HR 9 10 HR shared services and Outsourcing Global privacy and Security 11 12 Social media 9 Cloud HR What do a carve out from a global medical device maker, a fast-growing
Splunk: Using Big Data for Cybersecurity
Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH INTRODUCTION: WHO S IN YOUR NETWORK? The days when cyber security could focus on protecting your organisation s perimeter
Financing Trends in the Start-up Nation
6th Meeting of the European TTO Circle 20-21 January 2014 Financing Trends in the Start-up Nation Adv. Simon Weintraub ABOUT US Established over 55 years ago 1 of the largest and most dynamic law firms
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
The State of M&A in the Cybersecurity Market. October 28, 2015
The State of M&A in the Cybersecurity Market October 28, 2015 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the
Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology
Nine Cyber Security Trends for 2016
Nine Cyber Security Trends for 2016 12-17-15 Boxborough, MA 2016 will see an increasing number of attacks and the emergence of new targets; the complexity and sophistication of attacks, initiated by increasingly
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Managing the Ongoing Challenge of Insider Threats
CYBERSECURITY IN THE FEDERAL GOVERNMENT Managing the Ongoing Challenge of Insider Threats A WHITE PAPER PRESENTED BY: May 2015 PREPARED BY MARKET CONNECTIONS, INC. 11350 RANDOM HILLS ROAD, SUITE 800 FAIRFAX,
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute
Tuesday, August 19 th 9:00-9:45 am Keynote Address Prevent, Detect, Respond: A Framework for Effective Cyber Defense Security is now a mainstay of boardroom discussions. However, many organizations remain
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro Background Liwei Ren Research interests Data security & privacy, network security Data compression, math modeling & algorithms
Smart Buildings: The Lighting Controls Business 2015 to 2020
Smart Buildings: The Lighting Controls Business 2015 to 2020 Published: Q4 2015 The Lighting Controls Business 2015-2020 Synopsis This report helps all stakeholders and investors engaged in the Lighting
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
Customer-Centric Opportunities in Big Data
Customer-Centric Opportunities in Big Data Customer-Centric OPPORTUNITIES in BIG DATA Companies across most every commercial sector are scrambling to capitalize on opportunities created by the massive
Ty Miller. Director, Threat Intelligence Pty Ltd
Ty Miller Director, Threat Intelligence Pty Ltd Security Specialist Creator of Threat Analytics CREST Tech Lead, Assessor, Board of Directors Trained likes of FBI, US DoD, US Mil, International Govt agencies,
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
PCI DSS Overview and Solutions. Anwar McEntee [email protected]
PCI DSS Overview and Solutions Anwar McEntee [email protected] Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
