SlideShare uma empresa Scribd logo
1 de 14
Russian Information
Security Market
InfoSecurity Europe 2013
24-26 April, London
Alexander Dorofeev, CISA, CISSP
Business Development Director
information security professional services
certification | license consulting | audit | software development | training
Contents
2
Market size estimation
Main customers
People
Regulators
Education
Certification
Echelon’s experience
information security professional services
certification | license consulting | audit | software development | training
Market size in Russia
3
USD 500 m … 1,5 b
Network security (FW, IDS/IPS, VPN): USD 570 m
Vulnerability assessment software: USD 47 m
Multi-factor authentication solutions: USD 91 m
Content filtering: USD 500 m
Antivirus Software: USD 400 m
PKI: USD 250 m
SIEM: USD 24 m
IDM: USD 50 m
information security professional services
certification | license consulting | audit | software development | training
Main Customers
4
Government
& state
companies
Large
industrial
companies
Banks
information security professional services
certification | license consulting | audit | software development | training
Who works in information
security in Russia?
5
Ex-officers from the security
or military services
New generation
information security professional services
certification | license consulting | audit | software development | training 6
Market Regulators
The Russian Ministry
of Defense
The Russian Federal
Security Service
Russian Federal Service
on Technical and Export
Control
Central Bank
of Russia
information security professional services
certification | license consulting | audit | software development | training
The latest infosec laws and
standards
7
Federal Law of 27 July 2006 N 152-FZ «On the
personal data»
Federal Law of 27 June 2011 N 161-FZ «On
the National Payment System»
The Information Security Standard of the Central
Bank of the Russian Federation STO BR IBBS-1.0-
2010
information security professional services
certification | license consulting | audit | software development | training
Infosec education
8
More than 160 universities have
education programs in Information
Security
About 10 training centers. Courses:
ISO 27001, ethical hacking, personal
data protection, etc.
information security professional services
certification | license consulting | audit | software development | training
Popular consulting services
9
Personal data protection
IT-security audit
Development of policies
and procedures
information security professional services
certification | license consulting | audit | software development | training 10
The main driver of the Russian information
security market is compliance.
information security professional services
certification | license consulting | audit | software development | training 11
The key to the market for vendors is
software certification
information security professional services
certification | license consulting | audit | software development | training 12
The largest and the most experienced
certification laboratory in Russia
• Over 500 successful projects
The largest portfolio of international
customers
• In UK, USA, Canada, Israel, China, Germany,
Denmark, Slovakia, Netherlands, Ireland.
information security professional services
certification | license consulting | audit | software development | training
Our customers
13
information security professional services
certification | license consulting | audit | software development | training
Our contacts
14
Address: Elektrozavodskaya street, 24,
Moscow, Russian Federation, 107023
Phone/Fax: +7(495) 223-23-92
E-mail: mail@npo-echelon.ru
Web: www.npo-echelon.com

Mais conteúdo relacionado

Semelhante a Russian information security market

Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
[Fortifier] Reliable Engineering for Insurance (Alex Brovko)
[Fortifier] Reliable Engineering for Insurance (Alex Brovko)[Fortifier] Reliable Engineering for Insurance (Alex Brovko)
[Fortifier] Reliable Engineering for Insurance (Alex Brovko)Fortifier. IT Company
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM
 
Certification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionCertification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionPYA, P.C.
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profilesanirudha
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdSabrina Chan
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
webapplication-security-assessment-casestudy
webapplication-security-assessment-casestudy webapplication-security-assessment-casestudy
webapplication-security-assessment-casestudy AbiramiManikandan5
 
Introduction to E2 Labs
Introduction to E2 LabsIntroduction to E2 Labs
Introduction to E2 Labse2labs
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationFIDO Alliance
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 

Semelhante a Russian information security market (20)

I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
[Fortifier] Reliable Engineering for Insurance (Alex Brovko)
[Fortifier] Reliable Engineering for Insurance (Alex Brovko)[Fortifier] Reliable Engineering for Insurance (Alex Brovko)
[Fortifier] Reliable Engineering for Insurance (Alex Brovko)
 
IAM
IAMIAM
IAM
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019
 
Mirsis Corporate Overview
Mirsis Corporate OverviewMirsis Corporate Overview
Mirsis Corporate Overview
 
Certification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionCertification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance Solution
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profile
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
webapplication-security-assessment-casestudy
webapplication-security-assessment-casestudy webapplication-security-assessment-casestudy
webapplication-security-assessment-casestudy
 
Information security
Information securityInformation security
Information security
 
Introduction to E2 Labs
Introduction to E2 LabsIntroduction to E2 Labs
Introduction to E2 Labs
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 

Mais de cnpo

защита виртуальных сред с помощью сдз Rev01 (short)
защита виртуальных сред с помощью сдз Rev01 (short)защита виртуальных сред с помощью сдз Rev01 (short)
защита виртуальных сред с помощью сдз Rev01 (short)cnpo
 
титов российские Siem системы миф или реальность v03
титов российские Siem системы миф или реальность v03титов российские Siem системы миф или реальность v03
титов российские Siem системы миф или реальность v03cnpo
 
Net graph
Net graphNet graph
Net graphcnpo
 
Net topology
Net topology Net topology
Net topology cnpo
 
SHA1 weakness
SHA1 weaknessSHA1 weakness
SHA1 weaknesscnpo
 
Politics
PoliticsPolitics
Politicscnpo
 
Siem
SiemSiem
Siemcnpo
 
Licensing
LicensingLicensing
Licensingcnpo
 
Certification
CertificationCertification
Certificationcnpo
 
P dn docs
P dn docsP dn docs
P dn docscnpo
 
Social engineering
Social engineeringSocial engineering
Social engineeringcnpo
 
Audit intro
Audit introAudit intro
Audit introcnpo
 
Rubicon
RubiconRubicon
Rubiconcnpo
 
Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...
Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...
Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...cnpo
 
Фундамент открытого кода: построение защищенных систем и аудит их безопасности
Фундамент открытого кода: построение защищенных систем и аудит их безопасностиФундамент открытого кода: построение защищенных систем и аудит их безопасности
Фундамент открытого кода: построение защищенных систем и аудит их безопасностиcnpo
 
Сканер-ВС. Сертифицированный инструмент для этичного хакера
Сканер-ВС. Сертифицированный инструмент для этичного хакераСканер-ВС. Сертифицированный инструмент для этичного хакера
Сканер-ВС. Сертифицированный инструмент для этичного хакераcnpo
 
МЭ и СОВ Рубикон
МЭ и СОВ РубиконМЭ и СОВ Рубикон
МЭ и СОВ Рубиконcnpo
 
Почему нужна лицензия
Почему нужна лицензияПочему нужна лицензия
Почему нужна лицензияcnpo
 
Политики ИБ
Политики ИБПолитики ИБ
Политики ИБcnpo
 
Особенности сертификации зарубежных продуктов
Особенности сертификации зарубежных продуктовОсобенности сертификации зарубежных продуктов
Особенности сертификации зарубежных продуктовcnpo
 

Mais de cnpo (20)

защита виртуальных сред с помощью сдз Rev01 (short)
защита виртуальных сред с помощью сдз Rev01 (short)защита виртуальных сред с помощью сдз Rev01 (short)
защита виртуальных сред с помощью сдз Rev01 (short)
 
титов российские Siem системы миф или реальность v03
титов российские Siem системы миф или реальность v03титов российские Siem системы миф или реальность v03
титов российские Siem системы миф или реальность v03
 
Net graph
Net graphNet graph
Net graph
 
Net topology
Net topology Net topology
Net topology
 
SHA1 weakness
SHA1 weaknessSHA1 weakness
SHA1 weakness
 
Politics
PoliticsPolitics
Politics
 
Siem
SiemSiem
Siem
 
Licensing
LicensingLicensing
Licensing
 
Certification
CertificationCertification
Certification
 
P dn docs
P dn docsP dn docs
P dn docs
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Audit intro
Audit introAudit intro
Audit intro
 
Rubicon
RubiconRubicon
Rubicon
 
Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...
Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...
Вопросы комплексной защиты информации от программно-аппаратных воздействий в ...
 
Фундамент открытого кода: построение защищенных систем и аудит их безопасности
Фундамент открытого кода: построение защищенных систем и аудит их безопасностиФундамент открытого кода: построение защищенных систем и аудит их безопасности
Фундамент открытого кода: построение защищенных систем и аудит их безопасности
 
Сканер-ВС. Сертифицированный инструмент для этичного хакера
Сканер-ВС. Сертифицированный инструмент для этичного хакераСканер-ВС. Сертифицированный инструмент для этичного хакера
Сканер-ВС. Сертифицированный инструмент для этичного хакера
 
МЭ и СОВ Рубикон
МЭ и СОВ РубиконМЭ и СОВ Рубикон
МЭ и СОВ Рубикон
 
Почему нужна лицензия
Почему нужна лицензияПочему нужна лицензия
Почему нужна лицензия
 
Политики ИБ
Политики ИБПолитики ИБ
Политики ИБ
 
Особенности сертификации зарубежных продуктов
Особенности сертификации зарубежных продуктовОсобенности сертификации зарубежных продуктов
Особенности сертификации зарубежных продуктов
 

Russian information security market

  • 1. Russian Information Security Market InfoSecurity Europe 2013 24-26 April, London Alexander Dorofeev, CISA, CISSP Business Development Director
  • 2. information security professional services certification | license consulting | audit | software development | training Contents 2 Market size estimation Main customers People Regulators Education Certification Echelon’s experience
  • 3. information security professional services certification | license consulting | audit | software development | training Market size in Russia 3 USD 500 m … 1,5 b Network security (FW, IDS/IPS, VPN): USD 570 m Vulnerability assessment software: USD 47 m Multi-factor authentication solutions: USD 91 m Content filtering: USD 500 m Antivirus Software: USD 400 m PKI: USD 250 m SIEM: USD 24 m IDM: USD 50 m
  • 4. information security professional services certification | license consulting | audit | software development | training Main Customers 4 Government & state companies Large industrial companies Banks
  • 5. information security professional services certification | license consulting | audit | software development | training Who works in information security in Russia? 5 Ex-officers from the security or military services New generation
  • 6. information security professional services certification | license consulting | audit | software development | training 6 Market Regulators The Russian Ministry of Defense The Russian Federal Security Service Russian Federal Service on Technical and Export Control Central Bank of Russia
  • 7. information security professional services certification | license consulting | audit | software development | training The latest infosec laws and standards 7 Federal Law of 27 July 2006 N 152-FZ «On the personal data» Federal Law of 27 June 2011 N 161-FZ «On the National Payment System» The Information Security Standard of the Central Bank of the Russian Federation STO BR IBBS-1.0- 2010
  • 8. information security professional services certification | license consulting | audit | software development | training Infosec education 8 More than 160 universities have education programs in Information Security About 10 training centers. Courses: ISO 27001, ethical hacking, personal data protection, etc.
  • 9. information security professional services certification | license consulting | audit | software development | training Popular consulting services 9 Personal data protection IT-security audit Development of policies and procedures
  • 10. information security professional services certification | license consulting | audit | software development | training 10 The main driver of the Russian information security market is compliance.
  • 11. information security professional services certification | license consulting | audit | software development | training 11 The key to the market for vendors is software certification
  • 12. information security professional services certification | license consulting | audit | software development | training 12 The largest and the most experienced certification laboratory in Russia • Over 500 successful projects The largest portfolio of international customers • In UK, USA, Canada, Israel, China, Germany, Denmark, Slovakia, Netherlands, Ireland.
  • 13. information security professional services certification | license consulting | audit | software development | training Our customers 13
  • 14. information security professional services certification | license consulting | audit | software development | training Our contacts 14 Address: Elektrozavodskaya street, 24, Moscow, Russian Federation, 107023 Phone/Fax: +7(495) 223-23-92 E-mail: mail@npo-echelon.ru Web: www.npo-echelon.com