Hi {{ session.user.profile.firstName }}

Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not

Manage webcast
Bob Ackerman, Ted Schlein, Asheem Chandna, Alberto Ypez
Cybersecurity has moved to the front pages of American's newspapers, the Halls of Congress, the White House and the Board Rooms of major corporations. These dynamics continue to drive the demand for innovative technologies as electronic threats to computer networks and intellectual property have exploded in recent years. With the stakes high, government and corporate customers are stepping up their investments in defensive technologies and preventative measures to secure their digital frontiers.

Global cybersecurity spending is expected to top $60 billion this year according to the Cyber Security M&A Report by PricewaterhouseCoopers. The 172 US critical infrastructure organizations surveyed in a study by Bloomberg Government and the Ponemon Institute said that they currently spend $5.3 billion on cybersecurity and estimated that they would have to spend $46.6 billion over the next 12 to 18 months to reach a level of security where they could stop 95% of cyberattacks. Additionally, the Homeland Security Department would sharply raise spending for cybersecurity under the White House 2013 budget request to $769 million, up from $459 million this year.

In 2011, there were 150 security-related M&A deals, including Intel's $7.7 billion acquisition of McAfee and Hewlett-Packard's $1.6 billion acquisition of ArcSight, up from 69 deals in 2007. In response to growing customer spending as well as related M&A activity, the venture capital investment community is actively engaged in developing the technologies at the forefront of this battle.

Moderator:
Bob Ackerman, Founder and Managing Director, Allegis Capital

Panelists:
Ted Schlein, Managing Partner, Kleiner Perkins Caufield Byers
Asheem Chandna, Partner, Greylock Partners
Alberto Ypez, Managing Director, Trident Capital

Security Innovation Network (SINET) IT Security Entrepreneurs' Forum (ITSEF 2012)
Jul 19 2012
72 mins
Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not
More from this community:

IT Security

  • Date
  • Rating
  • Views
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Cloud Access Security Brokers (CASBs) are one of the hottest new security technologies on the market. Recommended by Gartner, they provide visibility and control in a new IT world now based in public cloud applications and corporate data being accessed by employee BYOD devices.
  • As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.

    On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:

    - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
    - how companies have used BitSight Security Ratings to notify key vendors of security incidents
    - how vendor ratings can allow for more effective communication and thus greater transparency
  • As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.

    On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:

    - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
    - how companies have used BitSight Security Ratings to notify key vendors of security incidents
    - how vendor ratings can allow for more effective communication and thus greater transparency
  • As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.

    On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:

    - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
    - how companies have used BitSight Security Ratings to notify key vendors of security incidents
    - how vendor ratings can allow for more effective communication and thus greater transparency

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not
  • Live at: Jul 19 2012 7:00 pm
  • Presented by: Bob Ackerman, Ted Schlein, Asheem Chandna, Alberto Ypez
  • From:
Your email has been sent.
or close
You must be logged in to email this