Cyber Security Investment Trends for 2012 & Beyond: Whats Hot/ Whats Not
Cybersecurity has moved to the front pages of American's newspapers, the Halls of Congress, the White House and the Board Rooms of major corporations. These dynamics continue to drive the demand for innovative technologies as electronic threats to computer networks and intellectual property hav
Cybersecurity has moved to the front pages of American's newspapers, the Halls of Congress, the White House and the Board Rooms of major corporations. These dynamics continue to drive the demand for innovative technologies as electronic threats to computer networks and intellectual property have exploded in recent years. With the stakes high, government and corporate customers are stepping up their investments in defensive technologies and preventative measures to secure their digital frontiers.
Global cybersecurity spending is expected to top $60 billion this year according to the Cyber Security M&A Report by PricewaterhouseCoopers. The 172 US critical infrastructure organizations surveyed in a study by Bloomberg Government and the Ponemon Institute said that they currently spend $5.3 billion on cybersecurity and estimated that they would have to spend $46.6 billion over the next 12 to 18 months to reach a level of security where they could stop 95% of cyberattacks. Additionally, the Homeland Security Department would sharply raise spending for cybersecurity under the White House 2013 budget request to $769 million, up from $459 million this year.
In 2011, there were 150 security-related M&A deals, including Intel's $7.7 billion acquisition of McAfee and Hewlett-Packard's $1.6 billion acquisition of ArcSight, up from 69 deals in 2007. In response to growing customer spending as well as related M&A activity, the venture capital investment community is actively engaged in developing the technologies at the forefront of this battle.
Bob Ackerman, Founder and Managing Director, Allegis Capital
Ted Schlein, Managing Partner, Kleiner Perkins Caufield Byers
Asheem Chandna, Partner, Greylock Partners
Alberto Ypez, Managing Director, Trident Capital
Security Innovation Network (SINET) IT Security Entrepreneurs' Forum (ITSEF 2012)
RecordedJul 19 201272 mins
Your place is confirmed, we'll send you email reminders
A cyber-threat group exploiting commercial entities and Government agencies across India for over a decade! Suspected Pakistani Threat Actor Using Surveillance Malware Against Indian Entities! Computers at three banks, pharmaceutical company hacked; hackers demand ransom in bitcoins!
Almost every day news is full of stories about companies and nations grappling with the new cyber threat landscape. There is a lot more happening behind the scene.
Join FireEye webinar “Crime & Spies: The Great Indian Cyber Robbery” to hear from the people and the organization which has been the first responder to the majority of the high profile cyber breaches across the world. FireEye has been curating intelligence on malware, advanced threat group tactics and attacker behavior for over a decade.
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
PCI compliance is a steep enough challenge, but what happens when your entire infrastructure is in AWS? Do the same concepts of network segmentation and separation apply, and if so how? At what point do AWS compliance efforts intersect with your compliance efforts?
Join this webinar where we will cover how a customer is using the Palo Alto Networks VM-Series for AWS to maintain separation of data and traffic in AWS to improve security and achieve PCI compliance.
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
Are you an (ISC)² member with questions about your certification? Would you like to hear more about member benefits and how (ISC)2 can help you? Join the Guide to your (ISC)2 Membership in EMEA webinar to learn more about these topics and others including:
•CPE opportunities, member benefits and getting involved
•Your membership requirements summarized
•Who are the (ISC)2 EMEA team and how we can help you
Application Defender can provide consistent and centralized logging of application use and abuse to SOCs or others tasked with Security Monitoring. Learn about the Application Logging categories and use cases that will enable you to gain visibility into application activity across the whole enterprise without changing source or parsing logs.
The Industrial Internet of Things is rapidly evolving, both in terms of its business requirements and the enabling technologies needed to improve decision-making and gain competitive advantage. The ideal technical solution should be able to fuse streaming Fast Data coming from IoT devices and sensors with static Big Data about customers and assets.
In this webinar, hosted by Brian Clark of Objectivity and analyst Jason Stamper of 451 Research, we’ll discuss how to augment these critical categories:
We’ll explain the technical challenges involved when supporting massive volumes of data in a mixed workload environment, and how to leverage open technologies, such as Spark and HDFS, to enable real-time IoT intelligence.
This year marked the Seventh Annual SINET IT Security Entrepreneurs' Forum (ITSEF) at Stanford University. The Forum's theme, Inspire - Innovate - Engage, resonated strongly throughout the day in a collegial setting that fostered robust, high level and energetic dialogue. View highlights from industry thought leaders on this year's forum and the value of SINET.
Nick Shevelyov, Rich Baich, Gary McAlum, Joe Sullivan
Mobile, Social, Cloud and Big Data are creating tectonic shifts within industry and government markets that are changing the way we interact with technology. But is the very technology that is empowering also imperiling us? When you think about all the data being generated by the sharing of personal information through the use of social networking and cloud services, as well as the user tracking features on mobile devices, there are tremendous opportunities for organizations to tailor their offerings for customer profiling. What potential abuses of this data do we see today? If you look to the future, what emerging technology trends will magnify the existing risks to individuals’ privacy? This panel will discuss the security and privacy concern by-products that come hand-in-hand with this technology revolution.
Jason Kaufman, Don More, Greg Oslan, Alberto Yepez
The pending Presidential Executive Order relative to Cybersecurity legislation, disruptive technologies, record cash, aggressive new buyers, and attractive valuations are stimulating entrepreneurs in this domain to consider selling their companies in 2013. Many entrepreneurs are taking advantage of this moment--but are you ready? What are the trends and lessons one needs to know? Should you contemplate an IPO or conduct an auction? What actions should be considered when selling to a strategic buyer versus a private equity firm? What is the process to achieve an optimal outcome? Hear from Chad Sweet, Co-Founder and CEO of The Chertoff Group, as he leads a panel of both advisors and entrepreneurs who have successfully navigated the sale process and can share with you their secrets to success.
Terremark and ArcSight had two of the largest acquisitions of recent times:
Terremark went public in March 2007 and was acquired by Verizon for $1.4 Billion in early 2011.
ArcSight went public in February 2008 and was acquired by HP for $1.5 Billion in September 2010.
Join this Fireside chat where these very successful CEOs will discuss and share how they entered the Federal Government market, the lessons learned, understand how to overcome barriers to entry, how to create the appropriate eco-system to successfully deploy solutions, how to best qualify opportunities and how to deal with the Federal Government procurement and acquisition processes. At the end, how they use these experiences to achieve success on the global market.
Robert Rodriguez, SINET; James Beeson, GE; Jason Hoffman, Autonomy; Leslie Lambert, Juniper Networks; Mike Siegal, Mocana
It took an acronym, BYOD, to focus the market’s attention on the impact mobile had on security and productivity as employees at every level began to Bring Their Own Device to the workplace. Now, both industry and government network security professionals face an onslaught of mobile devices permeating the enterprise and creating havoc.
This panel will discuss the ramifications of this trend and explore the role of technology and policy to contain the threats to security posed by mobility.
Robert Rodriguez, Chairman and Managing Principal, Security Innovation Network (moderator);
James Beeson, Chief Information Security Officer, GE Capital Americas;
Jason Hoffman, Head of Group Security, Chief Information Security Officer, Autonomy;
Leslie K. Lambert, VP and Chief Information Security Officer, Juniper Networks;
Mike Siegal, VP of Products, Services and Operations, Mocana
Joe Gottlieb, Sensage; Douglas Maughan, DHS; Nicko van Someren, Good; Sergio Thompson-Flores, CEO, Modulo
Bob Bragdon, Publisher, CSO Magazine;
Joe Gottlieb, President and CEO, Sensage;
Matt Greorgy, CEO, Endgame Systems;
Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
Ted Schlein, Managing Partner, KPCB;
Nicko van Someren, CTO, Good Technology
Sergio Thompson-Flores, CEO, Modulo;
as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
Bob Bragdon, CSO Magazine; Matt Greorgy, Endgame Systems; Rob Mancini, District of Columbia; Robert Rodriguez, SINET
Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.
Bob Bragdon, Publisher, CSO Magazine
Matt Greorgy, CTO, Endgame Systems;
Rob Mancini, CTO, District of Columbia
Richard Schaeffer, Principal, SINET;
Ted Schlein, Partner, KPCB;
Sergio-Thompson Flores, CEO, Modulo
Robert Rodriguez, Chairman, SINET