CYBER SECURITY SERVICES PWNED



Similar documents
The Value of Vulnerability Management*

Caretower s SIEM Managed Security Services

Key Cyber Risks at the ERP Level

Risk Analytics for Cyber Security

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Best Practices to Improve Breach Readiness

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Cybersecurity The role of Internal Audit

The Evolution of Application Monitoring

Logging In: Auditing Cybersecurity in an Unsecure World

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Unified Threat Management, Managed Security, and the Cloud Services Model

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Accenture Cyber Security Transformation. October 2015

The Next Generation of Security Leaders

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

ISE Northeast Executive Forum and Awards

Lot 1 Service Specification MANAGED SECURITY SERVICES

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

IT Security Strategy and Priorities. Stefan Lager CTO Services

2012 North American Managed Security Service Providers Growth Leadership Award

Think like an MBA not a CISSP

Big Data and Security: At the Edge of Prediction

Protecting against cyber threats and security breaches

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Overcoming PCI Compliance Challenges

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

A HELPING HAND TO PROTECT YOUR REPUTATION

Cybersecurity and internal audit. August 15, 2014

Big Data, Big Risk, Big Rewards. Hussein Syed

Intelligence Driven Security

IBM QRadar Security Intelligence April 2013

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Q1 Labs Corporate Overview

Defending Against Data Beaches: Internal Controls for Cybersecurity

Netzwerkvirtualisierung? Aber mit Sicherheit!

HP NonStop Server Security and HP ArcSight SIEM

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

CYBER SECURITY, A GROWING CIO PRIORITY

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Technical breakout session

Average annual cost of security incidents

How To Buy Nitro Security

Information & Asset Protection with SIEM and DLP

Phone: Fax:

Changing the Enterprise Security Landscape

Address C-level Cybersecurity issues to enable and secure Digital transformation

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

End-user Security Analytics Strengthens Protection with ArcSight

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Report on CAP Cybersecurity November 5, 2015

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Vulnerability Management

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Cyber-Security. FAS Annual Conference September 12, 2014

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

The webinar will begin shortly

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

2011 Forrester Research, Inc. Reproduction Prohibited

Cloud Infrastructure Security Management

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

CONTENTS. PCI DSS Compliance Guide

Evolving Threat Landscape

Department of Management Services. Request for Information

Windows Server 2003 End of Support. What does it mean? What are my options?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Into the cybersecurity breach

Enterprise Cybersecurity: Building an Effective Defense

From the Bottom to the Top: The Evolution of Application Monitoring

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber Security Seminar KTH

locuz.com Professional Services Security Audit Services

THE TOP 4 CONTROLS.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Transcription:

CYBER SECURITY SERVICES PWNED Jens Thonke Capital Market Day 16 Sept 2015 1

AGENDA Cyber Security Services in brief Market overview and key trends Offering and channels Competition Enabling growth Performance in 2015 Key initiatives Must-win battles in 2015-2017 <ADD TOPICAL PHOTO> 2

KEY MARKET DRIVERS REGULATION ATTACKS INCREASE EXECUTIVE FOCUS Market Drivers Increasing demand for regulatory compliance The increase in demand for regulatory compliance is a major challenge for firms around the world. PCI-DSS, WLA, ISO 27001, EU Data Protection Reform Focus on privacy The risk has always been there, but there's a lot more happening Big increase in incidents over the last 2 years Increasing complexity and sophistication of attacks requires greater skill sets Greater demand for pre-incident preparation Information security has gradually become a top issue for executives at most companies Increasing budgets and program selling Target driven tests Faster decision process 3

ATTACKS ARE INCREASING It is no longer an issue that concerns only information technology and security professionals; the impact has extended to the C-suite and boardroom. PwC 2015 Detected security incidents 4

DETECT AND RESPOND MARKET Included components Technology focused CS consulting services Products for "Detect" and "Respond" Managed services for "Detect" and "Respond" Approach Partial and gradual substitution of current product segments endpoint, SIEM, and IPS Partial substitution of current Managed Services Full consideration of technical consulting services M EUR) 4 000 3 000 2 000 1 000 0 85 214 European addressable market size 1 602 94 271 1 714 108 365 1 839 129 531 1 972 168 714 218 769 2 119 2 270 500 527 555 591 618 601 Emegring vectors Managed services Consulting 1 Products Emerging vectors Managed Services Consulting services Products Expected Growth >25% 20% 6% 3% PREDICT RESPOND PREVENT DETECT 2015 2016 2017 2018 2019 2020 1. Market assembled from the following segments: incident response services, forensics services, security outsourcing, endpoint, SIEM, and IPSSource: Gartner, Technavio, BCG research 5

MAIN TARGET MARKETS Proactively Managed Security Services Automated Detection and Alerting Incident Response DESCRIPTION Companies critical digital assets are being targeted at an unprecedented rate and the potential impact to their business has never been greater. DRIVERS Lack of Cyber Security professionals, more complex threats and the increasing demand for calls for intelligent and automated solutions consisting of products and people together. Increasing Regulatory and Compliance Requirements 6

CYBER SECURITY IS A PROCESS Understand your risk, know your attack surface, uncover weak spots PREDICT PREVENT Minimize attack surface, prevent incidents React to breaches, mitigate the damage, analyze and learn RESPOND DETECT Recognize incidents, isolate and contain them 7

OUR CYBER SECURITY OFFERING Security & Risk Assessment Security Advisory Threat Intelligence PREDICT PREVENT Compliance & Security Improvement Vulnerability Management Training & Security Culture Email & Web Traffic Scanning Security Management Anti-Malware Forensics RESPOND DETECT End-Point Detection Incident Response Advanced Threat Protection We will combine the capabilities of the acquired cyber security services and F-Secure Labs to create a new product for the enterprise market (estimated launch H1/2016) 8

UNDERSTAND THE RISK, KNOW YOUR ATTACK SURFACE, UNCOVER WEAK SPOTS cyber risk analysis SECURITY ADVISORY security strategy development security consultation PREDICT PREVENT SECURITY ASSESSMENT security review & analysis vulnerability assessment penetration testing PCI ASV scans RESPOND DETECT THREAT INTELLIGENCE Threat level assessment solution Riddler 9

MINIMIZE ATTACK SURFACE, PREVENT INCIDENTS COMPLIANCE & SECURITY IMPROVEMENT improvement programs vulnerability mgmt solution Karhu security standards & frameworks VULNERABILITY MANAGEMENT automatic patch mgmt PCI compliance assurance secure software development PREDICT PREVENT security coaching TRAINING & SECURITY CULTURE security & awareness training EMAIL & WEB TRAFFIC SCANNING secure email mobile VPN filtering & security web filtering RESPOND DETECT policy & config management SECURITY MANAGMENT device management application & web content control 10 Signature based AV for computers, servers & mobiles ANTI-MALWARE Real time reputation based protection network

RECOGNIZE INCIDENTS, ISOLATE AND CONTAIN PREDICT PREVENT END POINT DETECTION Behavioral detection Deepguard for computers, servers & mobile RESPOND DETECT ADVANCED THREAT PROTECTION monitoring & alerting platform security monitoring services 11

REACT TO BREACHES, MITIGATE THE DAMAGE, ANALYZE AND LEARN INCIDENT RESPONSE PREDICT PREVENT Emergency response hotline Incident response services recovery planning & execution FORENSICS RESPOND DETECT forensics services threat & breach analysis 12

OUR COMPETITIVE EDGE Cyber Security MSS KEY DIFFERENTIATOR COMPETITION Holistic approach together with our own inhouse developed technology and some of the best of the best Cyber Security Professionals. Our cloud based AI and forensics labs on several continents. We track an analyze in average more than 300.000 new security events each day. Why do we win? Completeness of Vision Clear strategy and Proven Business model Holistic approach Products and people together Ability to execute True European vendor Critical mass in Cyber Security Professionals in a otherwise very fragmentet market Our cloud based AI and forensics labs where we track an analyze in average more than 300.000 new security events each day. 13

REVENUE SPLIT BY PRODUCT & VERTICAL 10% 2% 16% 20% 8% 35% 68% 30% 11% Technical security services Security management services Security products Financial Gambling and gaming Service providers World leading brands Others 14

A TRUSTED PARTNER 55 % OF TOP NORDIC COMPANIES Source: Forbes Global 2000 (published on 18 April 2012) ranks largest companies in the world by a mix of four metrics: sales, profits, assets and market value. The figure above represents the share of Nordic companies on the list which are F-Secure customers. Source: https://en.wikipedia.org/wiki/list_of_largest_nordic_companies 15

MUST WINS Create the best solution for incident detection and response Products and services together Maintain and recruit the best of the best Cyber Security Professionals Focus on developing and retaining 16