Why Are Investors Excited About Cyber Security Startups, Again?

Similar documents
The Cyber Threat Landscape

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

OurCrowd Startup Investing Guide: Cybersecurity

Cybersecurity report As technology evolves, new risks drive innovation in cybersecurity

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Phone: Fax:

Cyber Security Market by Solution - Global Forecast to 2020

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

A Love Affair: Cyber Security, Big-data and Risk

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Managing the Unpredictable Human Element of Cybersecurity

2015 VORMETRIC INSIDER THREAT REPORT

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

The Importance of Cybersecurity Monitoring for Utilities

CFIR - Finance IT 2015 Cyber security September 2015

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

How To Protect Your Organization From Insider Threats

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cybersecurity Strategic Talent Management. March, 2012

Security & privacy in the cloud; an easy road?

POLICIES TO MITIGATE CYBER RISK

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Logging In: Auditing Cybersecurity in an Unsecure World

Brochure More information from

Cybersecurity's Money Men

Cybersecurity: What CFO s Need to Know

Cybersecurity. Are you prepared?

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Cybersecurity The role of Internal Audit

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Seminar: Security Metrics in Cloud Computing ( se)

Locked Shields Kaur Kasak 24 Sept 2013

Raytheon and Vista Equity Partners form new cybersecurity company

Cyber Security for Start-ups: An Affordable 10-Step Plan

Middle Class Economics: Cybersecurity Updated August 7, 2015

Palo Alto Networks. September 2014

IoT Security: Problems, Challenges and Solutions

IBM Security Strategy

Cybersecurity: Mission integration to protect your assets

Introduction to Cybersecurity Overview. October 2014

What is Really Needed to Secure the Internet of Things?

Cybersecurity Delivering Confidence in the Cyber Domain

Agenda , Palo Alto Networks. Confidential and Proprietary.

CYBER SECURITY TRAINING SAFE AND SECURE

Enabling HR service delivery

Splunk: Using Big Data for Cybersecurity

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Financing Trends in the Start-up Nation

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

The State of M&A in the Cybersecurity Market. October 28, 2015

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Internet threats: steps to security for your small business

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Nine Cyber Security Trends for 2016

WRITTEN TESTIMONY OF

Managing the Ongoing Challenge of Insider Threats

Corporate Spying An Overview

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

IoT Security: Problems, Challenges and Solutions

Smart Buildings: The Lighting Controls Business 2015 to 2020

Cyber security trends & strategy for business (digital?)

Customer-Centric Opportunities in Big Data

Ty Miller. Director, Threat Intelligence Pty Ltd

MarketsandMarkets. Publisher Sample

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

SCADA Security Training

PCI DSS Overview and Solutions. Anwar McEntee

CYBERSECURITY RISK MANAGEMENT

Transcription:

Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1

Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial Internet (FUD 1.0) - 2000: dot-com bubble burst (double-digit security spend as %IT) - 2002: inflection point (FUD 1.5) - 2005: consumer Internet distraction - 2008: global economic crash - 2011: media focus on all things cyber (FUD 2.0) - 2013: Snowden and the fragility of the Internet (anti-fud?) Two Real Cybersecurity Drivers - Governments and corporations are under attack from cyber hacks (no longer simply a nuisance) - IT budgets are being freed up for products and services to strengthen digital defenses (convergence of risk) 2

Businesses Under Fire Hackers are stealing around $250B/year in IP - NSA Director, Gen. Keith Alexander, calls these attacks "the greatest wealth transfer in history" Significant YoY increases in cyber attacks - DHS reported a 68% increase in cyber attacks in 2012 at federal agencies, government partners, and against critical infrastructure - Symantec reported attacks on companies rose 42% in 2012 U.S. government is increasing spending in cybersecurity (despite cuts elsewhere) 3

Gartner Nexus of Forces Pervasive Access -mobile Global Delivery -cloud Big Context -information Extreme Behavior -social A tsunami of change rocking the IT world (David Cowen, Bessemer) 4

Concentration of Risk New threat vectors once again an obstacle to Internet-fueled growth plans (mobile and cloud) - So cash is being thrown at possible solutions Security is in the conversation at the board level - 80% of G2K reporting cyber security preparations to the board Gartner estimates 39% increase in security spend: - From $67B (in 2013) to $93B (in 2017) Makes cybersecurity ripe for the harvest - The 8.7% annual growth rate is compelling metric for investors Cyberattack news onslaught is making a difference - VCs move quickly to fund startups that could solve problems discussed in cyberattack headlines 5

Money Follows Problems Driving investment in innovative technologies - $391M in just 16 companies between Jan 2012 and Sep 2013: AnchorFree ($52M) Bit9 ($25.8M) Bromium ($26.5M) CipherCloud ($30M) CrowdStrike ($26M) Cylance ($15) Cyphort ($7M) Cyvera ($11M) Endgame ($23M) FireEye ($50M) Mocana ($25M) Nok Nok Labs ($15M) Shape Security ($20M) Skyhigh Networks ($20M) Veracode ($30M) Vormetric ($15M) Cybersecurity market is in a renaissance: - $1B invested in cybersecurity startups in 2012 Up 5% over 2011 (vs. overall venture funding down 10% YoY) 2011 cybersecurity funding was up 94% over 2010 6

And New Exit Opportunities Mergers and Acquisitions (M&A) - Cisco NDS - ProofPoint Amortize Technologies - Blue Coat Solera Networks - Cisco Sourcefire ($2.7B or ~10x annual revenue) - IBM Trusteer ($800M or ~10x annual revenue) Initial Public Offering (IPO) - Palo Alto Networks - Qualys - FireEye (hot $300M IPO in September 2013) Private Equity Carve-Outs and Roll-Ups - $200M investment in Airwatch (aggregation strategy) 7

Making Cybersecurity a Top-of- Mind Investment Category Cloud computing is and will remain one of the most attractive destinations for entrepreneurs, technologists, and investors - It opens enormous vulnerabilities on the Internet, but it also presents great opportunity for innovative cybersecurity (David Cowen, Bessemer) VCs are sniffing for cybersecurity, again, asking - Can you get me to an IPO and show me a billion dollar return? Private company valuations doubled+ in two years New Cyber-Focused Accelerators / Incubators - Mach37 Cybersecurity Accelerator (Virginia) - JVP National Cybersecurity Incubator (BGU, Beer Sheva) - Cisco Israel Cybersecurity Incubator (John Chambers, May 2013) 8

A Note on Shifting Sand The venture industry is very good at adapting - Money that flowed into the consumer Internet market until 2011 mostly dried up in 2012 and 2013 - Current focus is on enterprise solutions helping the enterprise cope with Gartner s nexus of forces - Exits like Waze, IPOs like Wix, and new investment in startups like Webydo, suggest the cycle in consumer will happen again - But current money (and VC partner talent) is still trying to pivot into the enterprise space as indicated by the new activity (buzz) Enterprise companies are long-lasting value plays - Consumer IPOs (Zynga, Facebook, LinkedIn) are exciting while enterprise IPOs are not (get drowned out) - But, on average, enterprise IPO companies have appreciated about 30% to 40% after the IPO in the last 10 years while consumer IPO companies have dropped a similar amount 9

Where Regulations Matter Focus on regulated industries - The hotbed of the next wave of SaaS Life sciences (health care, research) Financial services industry (insurance, banking) Cloud is a great opportunity in regulated markets - clear path of who is doing what (identity management) - version management (code control) by the vendor - security and access protocols managed properly and done right central multi-tenured architecture not compromised by multiple customized software solutions valid across all locations Security not as a competitive advantage but as an enabler of the nexus of forces 10

Expertise Counts Domain expertise is key (for investors and buyers) - Does the team have deep backgrounds and really understand how customers bought software in the past, how they re going to buy it now, what channels work, what pricing models work, what features should be given first, second, and third? Does the team really know its vertical market? - How many people really understand healthcare and cloud technology and how to roll that out? 11

Government Cyberwarfare & CIP More than 80 companies work with the NSA on cyberwarfare and surveillance (Der Spiegel) - Unique role for private sector defending a nation in cyberspace - Potential for conflict between mission and financial drivers Claims that U.S. National Security Agency is funding digital Blackwater and cyber Raytheon - Private suppliers of technology, intelligence, and talent Blackwater (a private military company, now Academi) Raytheon (defense contractor and military equipment maker) - Private suppliers of offensive (and defensive) cybersecurity Endgame Shape ManTech International HB Gary 12

Ron s Radar 13 Encryption it is time yet? - Silent Circle (Zimmerman s PGP reboot) and Wikr (message selfdestruction) need is not universal but good timing - Protecting the data inside the cloud and in transit (Vaultive, Dark Matter Labs, Porticor, CipherCloud) security carried with data Cloud-based security services enabling the cloud - Easier to deploy, cheaper to manage, code is always up-to-date - Correlation of data from multiple incidents (SumoLogic, CTCH) Threat Intelligence needle in the haystack - Cylance, ThreatMetrix and Seculert are examples Fraud-prevention sensor-supported policies - Transaction decisions based on more than user ID and password (like geo-location input from XYVerify) - Device fingerprinting/reputation and big-data analysis (Iovation)

Character is much easier kept than recovered Thomas Paine, US patriot & political philosopher (1737-1809) Security still a knee-jerk reaction to an attack - Spend not correlated to revenue (or direct expense reduction) - BYOD as an example IT infra security still a one-time, ad hoc effort - But more security is now embedded within daily operations Security as a broad collection of technologies - Still not an inherent, proactive and continual aspect of governance Cybersecurity never gets solved - Like an antibiotic-resistant bacteria: attackers adapt to defenses and render them obsolete (David Cowen, Bessemer) 14

Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC +972 54 625 6597 Ron@Moritz.US @RonMoritz