CYBER SECURITY SERVICES PWNED Jens Thonke Capital Market Day 16 Sept 2015 1
AGENDA Cyber Security Services in brief Market overview and key trends Offering and channels Competition Enabling growth Performance in 2015 Key initiatives Must-win battles in 2015-2017 <ADD TOPICAL PHOTO> 2
KEY MARKET DRIVERS REGULATION ATTACKS INCREASE EXECUTIVE FOCUS Market Drivers Increasing demand for regulatory compliance The increase in demand for regulatory compliance is a major challenge for firms around the world. PCI-DSS, WLA, ISO 27001, EU Data Protection Reform Focus on privacy The risk has always been there, but there's a lot more happening Big increase in incidents over the last 2 years Increasing complexity and sophistication of attacks requires greater skill sets Greater demand for pre-incident preparation Information security has gradually become a top issue for executives at most companies Increasing budgets and program selling Target driven tests Faster decision process 3
ATTACKS ARE INCREASING It is no longer an issue that concerns only information technology and security professionals; the impact has extended to the C-suite and boardroom. PwC 2015 Detected security incidents 4
DETECT AND RESPOND MARKET Included components Technology focused CS consulting services Products for "Detect" and "Respond" Managed services for "Detect" and "Respond" Approach Partial and gradual substitution of current product segments endpoint, SIEM, and IPS Partial substitution of current Managed Services Full consideration of technical consulting services M EUR) 4 000 3 000 2 000 1 000 0 85 214 European addressable market size 1 602 94 271 1 714 108 365 1 839 129 531 1 972 168 714 218 769 2 119 2 270 500 527 555 591 618 601 Emegring vectors Managed services Consulting 1 Products Emerging vectors Managed Services Consulting services Products Expected Growth >25% 20% 6% 3% PREDICT RESPOND PREVENT DETECT 2015 2016 2017 2018 2019 2020 1. Market assembled from the following segments: incident response services, forensics services, security outsourcing, endpoint, SIEM, and IPSSource: Gartner, Technavio, BCG research 5
MAIN TARGET MARKETS Proactively Managed Security Services Automated Detection and Alerting Incident Response DESCRIPTION Companies critical digital assets are being targeted at an unprecedented rate and the potential impact to their business has never been greater. DRIVERS Lack of Cyber Security professionals, more complex threats and the increasing demand for calls for intelligent and automated solutions consisting of products and people together. Increasing Regulatory and Compliance Requirements 6
CYBER SECURITY IS A PROCESS Understand your risk, know your attack surface, uncover weak spots PREDICT PREVENT Minimize attack surface, prevent incidents React to breaches, mitigate the damage, analyze and learn RESPOND DETECT Recognize incidents, isolate and contain them 7
OUR CYBER SECURITY OFFERING Security & Risk Assessment Security Advisory Threat Intelligence PREDICT PREVENT Compliance & Security Improvement Vulnerability Management Training & Security Culture Email & Web Traffic Scanning Security Management Anti-Malware Forensics RESPOND DETECT End-Point Detection Incident Response Advanced Threat Protection We will combine the capabilities of the acquired cyber security services and F-Secure Labs to create a new product for the enterprise market (estimated launch H1/2016) 8
UNDERSTAND THE RISK, KNOW YOUR ATTACK SURFACE, UNCOVER WEAK SPOTS cyber risk analysis SECURITY ADVISORY security strategy development security consultation PREDICT PREVENT SECURITY ASSESSMENT security review & analysis vulnerability assessment penetration testing PCI ASV scans RESPOND DETECT THREAT INTELLIGENCE Threat level assessment solution Riddler 9
MINIMIZE ATTACK SURFACE, PREVENT INCIDENTS COMPLIANCE & SECURITY IMPROVEMENT improvement programs vulnerability mgmt solution Karhu security standards & frameworks VULNERABILITY MANAGEMENT automatic patch mgmt PCI compliance assurance secure software development PREDICT PREVENT security coaching TRAINING & SECURITY CULTURE security & awareness training EMAIL & WEB TRAFFIC SCANNING secure email mobile VPN filtering & security web filtering RESPOND DETECT policy & config management SECURITY MANAGMENT device management application & web content control 10 Signature based AV for computers, servers & mobiles ANTI-MALWARE Real time reputation based protection network
RECOGNIZE INCIDENTS, ISOLATE AND CONTAIN PREDICT PREVENT END POINT DETECTION Behavioral detection Deepguard for computers, servers & mobile RESPOND DETECT ADVANCED THREAT PROTECTION monitoring & alerting platform security monitoring services 11
REACT TO BREACHES, MITIGATE THE DAMAGE, ANALYZE AND LEARN INCIDENT RESPONSE PREDICT PREVENT Emergency response hotline Incident response services recovery planning & execution FORENSICS RESPOND DETECT forensics services threat & breach analysis 12
OUR COMPETITIVE EDGE Cyber Security MSS KEY DIFFERENTIATOR COMPETITION Holistic approach together with our own inhouse developed technology and some of the best of the best Cyber Security Professionals. Our cloud based AI and forensics labs on several continents. We track an analyze in average more than 300.000 new security events each day. Why do we win? Completeness of Vision Clear strategy and Proven Business model Holistic approach Products and people together Ability to execute True European vendor Critical mass in Cyber Security Professionals in a otherwise very fragmentet market Our cloud based AI and forensics labs where we track an analyze in average more than 300.000 new security events each day. 13
REVENUE SPLIT BY PRODUCT & VERTICAL 10% 2% 16% 20% 8% 35% 68% 30% 11% Technical security services Security management services Security products Financial Gambling and gaming Service providers World leading brands Others 14
A TRUSTED PARTNER 55 % OF TOP NORDIC COMPANIES Source: Forbes Global 2000 (published on 18 April 2012) ranks largest companies in the world by a mix of four metrics: sales, profits, assets and market value. The figure above represents the share of Nordic companies on the list which are F-Secure customers. Source: https://en.wikipedia.org/wiki/list_of_largest_nordic_companies 15
MUST WINS Create the best solution for incident detection and response Products and services together Maintain and recruit the best of the best Cyber Security Professionals Focus on developing and retaining 16