Investing in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014



Similar documents
OurCrowd Startup Investing Guide: Cybersecurity

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

Why Are Investors Excited About Cyber Security Startups, Again?

IT Security Q Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference.

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Braindumps QA

Ty Miller. Director, Threat Intelligence Pty Ltd

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Introduction to Cybersecurity Overview. October 2014

Cyber Security Threats

Changing Legal Landscape in Cybersecurity: Implications for Business

Cybersecurity's Money Men

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Company Profile S Flores #205 San Antonio, TX

TRENDS IN THE THREAT LANDSCAPE

IT Security. The Acquisition Boom

Asset Management Equity Business Security, Safety & Protection Industry

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

The Cyber Threat Landscape

CYBERSECURITY: Is Your Business Ready?

The State of M&A in the Cybersecurity Market. October 28, 2015

DEC Next Generation Security with Endpoint Detection and Response WHITE PAPER

Cybersecurity. Are you prepared?

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Market Guide for Network Sandboxing

Are You A Sitting Duck?

PREPARE YOUR INCIDENT RESPONSE TEAM

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Raising the TOUGH MONEY. Part II Private & Public VENTURE CAPITAL

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Presented by Frederick J. Santarsiere

Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Participants: Introduction:

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance

McAfee Network Security Platform

Fostering Security Innovation: Silicon Valley VC Perspective

Cybersecurity report As technology evolves, new risks drive innovation in cybersecurity

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

A Love Affair: Cyber Security, Big-data and Risk

Splunk: Using Big Data for Cybersecurity

SourceFireNext-Generation IPS

Business continuity. Protecting your systems in today s world

Defensible Strategy To. Cyber Incident Response

IT Governance: The Directors Cut. What Directors Need to Know

Angel Investing in Cybersecurity: Aligning With a Vertical Accelerator

Conducting due diligence and managing cybersecurity in medical technology investments

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Presidential Summit Reveals Cybersecurity Concerns, Trends

Brochure More information from

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since Cyber Security Market Trends 2015

Agenda , Palo Alto Networks. Confidential and Proprietary.

RETHINKING CYBER SECURITY Changing the Business Conversation

Cyber Security and Science

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

The Landscape of Cyber, critical infrastructure and how Regulation fits in

Corporate Spying An Overview

Cybersecurity y Managing g the Risks

How To Write A National Cybersecurity Act

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

EnCase Endpoint Security Product Overview

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers

NATIONAL CYBER SECURITY AWARENESS MONTH

The Importance of Patching Non-Microsoft Applications

Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS

Into the cybersecurity breach

Can Cyber Insurance Be Linked to Assurance?

HOW TO PROTECT YOUR DATA

Palo Alto Networks. September 2014

The Five Most Common Cyber-Attack Myths Debunked

Testing the Security of your Applications

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Why Use Big Data for a Security Service?

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

Northrop Grumman Cybersecurity Research Consortium

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Cyber Security Risks for Banking Institutions.

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Supplier Vigilance: A Critical Layer of Defense

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

State of Security Survey GLOBAL FINDINGS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Content Security: Protect Your Network with Five Must-Haves

Cyber Risks in the Boardroom

Cyber Risk to Help Shape Industry Trends in 2014

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Beyond the Hype: Advanced Persistent Threats

Transcription:

Investing in Cyber Security Companies Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014

Table of Contents Evolving Themes in the Threat landscape Gov t/commercial Market Opportunities Mapping Investment $$ to Themes/Markets Public Company Valuations Venture Capital Exits Trends For the Future Summary

Cyber Semantics Historical financial data does not exist as Cyber per se but is found in many traditional IT related categories such as: This also holds true for future budgeting and forecasting purposes; especially w/r/t the Gov t/dod world The point being is that you really have to look in several places and even then info is not classified in a consistent manner

Evolving Themes in the Threat Landscape

Evolving Themes in the Threat Landscape

Evolving Themes in the Threat Landscape

Evolving Themes in the Threat Landscape

Gov t/commercial Market Opportunities American Business Under Fire Currently, hackers are stealing ~$400B a year in intellectual property; (estimates vary but # is BIG) Homeland Security reported a 68% increase in cyber attacks at federal agencies, critical infrastructure and government partners. Gen. Keith Alexander, Director of the National Security Agency, describes these attacks as "the greatest wealth transfer in history." According to Gartner, corporations are expected to spend $67B in Info Sec this year and will grow to $93B in 2017 U.S. Government is increasing spending on cyber security (despite cuts elsewhere) Direct impact on Executive Officer Careers (Target, Nieman etc.) Boards are being held accountable

Gov t/commercial Market Opportunities Global Market From $68B in2013 to $120B in 2017 US Fed Gov $65B from 2013 to 2018

Public Company Valuations

Public Company Valuations

Venture Capital Investments Highlights: $5.2B across 807 deals in past 5 years 2013 record $1.7B in 240 deals and 18% deal growth and 31% funding growth YoY 2014 Notable Deals: Cloudera $160M (X) Okta $75M (E) Centrify $42M(E) Skyhigh $40M (C ) Shape $40M(X) Bit9 $38M (E) OpenDNS $35M (C ) Illumio $34M (B)

Venture Capital Investments Highlights: Series E grew 1% to 19% from 2009 to 2013 Mid-range fell from 54% to 33% in same period Big bets are now in Series A

Venture Capital Investments VC firms are expected to funnel $788 million in 2014 a 74% increase into ~40 early-stage cybersecurity startups this year; Examples of hot areas are cloud, mobile malware and botwalls..vc s are Looking for Innovative small companies with radical ideas.. Andreessen Horowitz is one of the most active venture capital investors in the security space

Venture Capital Investments Most Well-Funded Companies in Cybersecurity (Mobile Security) (Cloud identity mgmt)

Venture Capital Investments

Exits: M&A

Exits: M&A Highlights: M&A is dominant path ~95% IPO s are 4% of exits in past 3 years including: 2013 Fireye and Barracuda 2014 MobileIron and Imprivita

Exits: M&A Have each acquired 8 companies Acquired Sourcefire for $2.7B Cisco Banks On Sourcefire And Snort For Its Security Future.

$1B $2.7B ~10X R $.8B ~10XR

Select Initial Public Offerings Prior to 2013 Palo Alto Networks(Appliance based Firewall/Perimeter Defense Protection) (2012/$2.8B), Imperva (Data Center Security)(2011/$332M), Fortinet(Network Security appliances) (2009/$700M) Qualys(Network Security/Vulnerability Mgmt.) (2012/$400M) 2013 Barracuda Networks ($1.1B) Email and web security developer FireEye ($300M) Malware and Cyber attack protection 2014 MobileIron ($672M) Enterprise mobility management Imprivata ($342M) Identity and access management appliance CyberArk ($425M) Priveleged account protection Next up??..(good Technologies, Okta,..)

Select Initial Public Offerings

Trends for the Future

Trends for the Future Cisco says 50B connected Every Thing Becomes things by 2020 Big Data. a Point of Attack.Predictive analytics..cyber

Keys Going Forward There are two types of companies: those that know they ve been breached and those that haven t figured it out yet.the game is no longer about prevention; it s about detection Ted Schlein (Kleiner..) The business is pivoting into the egress issue more than the ingress issue. How do you limit the impact of the attack? If they want to get in really badly, they probably will Shaygan Kheradpir, CEO of Juniper Networks Inc.. In Closing: He Who Defends Everything Defends Nothing Frederick The Great FOCUS on PROTECTING CRITICAL DATA Security and Privacy need to be designed in not just Patch and Pray Band-Aids

Suggested Reading/Viewing The CyberWire (Daily Cyber News Feed) Rise Of The Hackers aired on the PBS show Nova(http://www.pbs.org/wgbh/nova/tech/rise-of-the-hackers.html) Threat Vector by Tom Clancy Cybersecurity: What Everyone Needs to Know (Dr. Peter Singer, Brookings Institute)