Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not

Bob Ackerman, Ted Schlein, Asheem Chandna, Alberto Ypez
Cybersecurity has moved to the front pages of American's newspapers, the Halls of Congress, the White House and the Board Rooms of major corporations. These dynamics continue to drive the demand for innovative technologies as electronic threats to computer networks and intellectual property have exploded in recent years. With the stakes high, government and corporate customers are stepping up their investments in defensive technologies and preventative measures to secure their digital frontiers.

Global cybersecurity spending is expected to top $60 billion this year according to the Cyber Security M&A Report by PricewaterhouseCoopers. The 172 US critical infrastructure organizations surveyed in a study by Bloomberg Government and the Ponemon Institute said that they currently spend $5.3 billion on cybersecurity and estimated that they would have to spend $46.6 billion over the next 12 to 18 months to reach a level of security where they could stop 95% of cyberattacks. Additionally, the Homeland Security Department would sharply raise spending for cybersecurity under the White House 2013 budget request to $769 million, up from $459 million this year.

In 2011, there were 150 security-related M&A deals, including Intel's $7.7 billion acquisition of McAfee and Hewlett-Packard's $1.6 billion acquisition of ArcSight, up from 69 deals in 2007. In response to growing customer spending as well as related M&A activity, the venture capital investment community is actively engaged in developing the technologies at the forefront of this battle.

Moderator:
Bob Ackerman, Founder and Managing Director, Allegis Capital

Panelists:
Ted Schlein, Managing Partner, Kleiner Perkins Caufield Byers
Asheem Chandna, Partner, Greylock Partners
Alberto Ypez, Managing Director, Trident Capital

Security Innovation Network (SINET) IT Security Entrepreneurs' Forum (ITSEF 2012)
Jul 19 2012
72 mins
Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2836)
  • Upcoming (86)
  • Date
  • Rating
  • Views
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Anti-virus is not enough. McAfee Complete Endpoint Protection add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, as well as mobile devices such and tablets.
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Channel
  • Channel profile
Up Down
  • Work Together Even When You're Not Together! Collaborate in the Cloud Apr 23 2014 4:00 pm UTC 60 mins
    Collaboration is crucial when it comes to your marketing team. No matter if you're based locally or globally, the concept of work and the way we interact is completely changing. With smartphones and tablets taking over our lives, efficient collaboration, coordination, and consistency around marketing campaigns and messaging can be challenging when running a marketing organization.

    Join this webinar to discover:

    - The latest and greatest in marketing automation and file sharing platforms
    - Content collaboration tools that save time and keep branding consistent between teams
    - How centralizing assets can ease global content translation and localization
    - Real-time content and campaign sharing that can spark new ideas and educate your organization
  • Data Protection and Compliance: Where Encryption Applies Apr 23 2014 3:00 pm UTC 60 mins
    Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • Panel: Securing Documents and Data In A Mobile World Apr 22 2014 3:00 pm UTC 60 mins
    Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Security Metrics to Manage Change: Which Matter, Which Can Be Measured? Apr 17 2014 6:00 pm UTC 45 mins
    Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • Big Data Security: Challenges, Strategies and Tools Apr 17 2014 5:00 pm UTC 60 mins
    The webinar will explore the challenges facing security professionals concerning the prevalent and ever-increasing risks to Big Data Security, recommended strategies for closing the gaps, and tools and techniques for keeping Big Data secure.
  • Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk Apr 17 2014 4:00 pm UTC 45 mins
    The increasing volume of breaches we hear about in the news highlights the challenge risk managers face in working to address cyber risk. Current assessment methods, while insightful, are inadequate due to the pace at which security postures change, leaving organizations vulnerable and exposed in the blink of an eye. In order to truly reduce security risk, managers need more insight and better tools that allow for continuous visibility into the ever-changing network environments they are administering.

    Join Stephen Boyer, CTO and co-founder of BitSight Technologies, and Oliver Brew, Vice President of Professional Liability at Liberty International Underwriters (LIU) for this webinar to discover:

    - Why measuring security risk is difficult and how some assessment methods leave organizations vulnerable to threats and financial loss

    - How forward-looking organizations are using Big Data to reduce risk, increase transparency and address new regulatory requirements

    - Case Study: How LIU is using Security Ratings to mitigate risk
  • The Security of Big Data: An Enterprise Perspective Apr 17 2014 3:00 pm UTC 45 mins
    Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.

    The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step.
  • Building Your Backup and Recovery Checklist Apr 16 2014 5:00 pm UTC 60 mins
    Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:

    -Cut storage requirements by up to 80%
    -Save on storage costs and performance hits to your network.
    -Leverage near-instant recovery technology for protected virtual machines or servers.
    -Automate application-aware backups and testing for data corruption.
  • The Cybersecurity Framework is here, now what? Apr 16 2014 5:00 pm UTC 60 mins
    Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Beyond attack signatures: Leveraging realtime analytics to pinpoint threats Apr 16 2014 4:00 pm UTC 45 mins
    Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?

    How do I collect the right data?
    What kinds of new detections can I do?
    How do I get enough context to overcome false positives?
    How do I automate more of my security intelligence, or the intelligence of others?
    What should I look for in a solution?
    How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?

    These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
  • Re-defining Network Security Performance: Beyond Just Firewalls Apr 16 2014 3:00 pm UTC 60 mins
    Today’s IT professionals need security firewalls that do more than just packet filtering and stateful inspection. It’s critical that network pros redefine which metrics will actually ensure their security solutions will not be a performance bottleneck. This webinar digs into today’s firewall solutions, exploring their capabilities and providing pointers for selecting the solution that best meets IT security and performance requirements.

    What You Will Learn
    Why packet filtering and IPS aren’t the only performance metrics that matter
    The performance impact of running multiple security services
    How to select in-line security products that meet today’s multi-function security needs
  • Protection, Detection and Response: Security across the threat lifecycle Recorded: Apr 15 2014 4 mins
    Patrick and Mike discuss the importance of focusing on the complete security life-cycle: prevention, detection and response. They will also discuss the four essential pillars of incident response and how you can strengthen your security strategy across all endpoints, without getting buried in data.
  • How do you find a needle in a haystack? Uncover Big Data Security Analytics Recorded: Apr 15 2014 38 mins
    Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Using SIEM and Big Data to detect invisible threats Recorded: Apr 10 2014 51 mins
    The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • Intro to Box Recorded: Apr 9 2014 29 mins
    Join us for our Intro to Box series, a monthly discussion of the latest in the world of enterprise IT, content collaboration, cloud technology, and Box. We'll cover an overview of Box, how businesses like yours are changing the way they work with Box and other cloud technologies, and walk through a demo of the latest and greatest in the product. The sessions will be led by Box product experts, and you might even get a guest appearance from one of our fearless leaders.
  • Panel: In Search of Usable Network Security Recorded: Apr 9 2014 61 mins
    The Internet, as a communication medium, has been evolving. This evolution, unfortunately, has brought with it growth in Internet-based attacks, and corresponding growth in security technologies to fight these attacks. But, with this growth in security technologies, unintended complexity for security professionals has intensified. Join our roundtable as we endeavor to identify the factors contributing to security management complexity and how enhanced manageability tools can help.
  • Proactive Protection through Real Time Intelligence Recorded: Apr 9 2014 29 mins
    Outdated security approaches and stagnant, inaccurate data put your users at risk from today’s sophisticated cyber-attacks. Join us to learn about Webroot BrightCloud Security Services, and discover why companies such as RSA, F5, and Cisco have incorporated them into their solutions. We will also demonstrate how Webroot correlates disparate data on IPs, URLs, Files and Apps to provide highly accurate, next generation threat intelligence that enables our partners to proactively combat today’s advanced, and even previously unknown, threats in real time.
  • Big Data = Big Problems Recorded: Apr 9 2014 49 mins
    Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Cyber Crime and the Insider Threats in Data Security Recorded: Apr 8 2014 48 mins
    Whether driven by opportunism, greed, a desire for revenge, or a combination of all three, company insiders exploit their positions of trust to obtain access to their organization’s most valued digital assets. Moles, opportunists, contractors, disgruntled employees, and ex-IT personnel—all currently pose a greater risk to corporate intellectual property than state-sponsored hacking and APTs, both in frequency and in damage caused. Hear from Kroll Managing Director Jonathan Fairtlough about the challenges related to insider investigations, and how policies and proof-points can be implemented to lessen the chances of insider-driven data damage.
  • 7 habits of highly *ineffective* Big Data security Recorded: Apr 8 2014 57 mins
    It’s an inconvenient truth that proven and well-understood data security methods were designed to work with relational database management systems. Over the decades, certain habits became second nature to security-minded IT professionals. But many of these habits are now fundamentally incompatible with Big Data/NoSQL environments.

    This presentation will walk you through the data security implications of key differences between NoSQL and relational databases. You’ll leave the session knowing:
    signs that Big Data/NoSQL may be coming to your organization
    7 security habits that expose Big Data to a breach...or cause major delays/rework
    how early adopters are making new security habits in the era of Big Data
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not
  • Live at: Jul 19 2012 7:00 pm
  • Presented by: Bob Ackerman, Ted Schlein, Asheem Chandna, Alberto Ypez
  • From:
Your email has been sent.
or close
You must be logged in to email this