SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
1
The Cyber Security Landscape
An OurCrowd Briefing
Ron Moritz
27 May 2014
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Your hosts
2
Zack Miller
Head of investor
community
@OurCrowd
Ron Moritz
Advisor, consultant and
OurCrowd mentor
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
OurCrowd’s portfolio
3
Cyber Security companies in our
portfolio
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
What is Cyber Security?
§ Cyber security – the evolution of a name
- EDP controls à IT audit à IT security à computer security à
network security à OT security à cyber security
- Practices, tools and concepts dealing with CIA
§ CIA: confidentiality, integrity, and availability of information
§ But also CIA of systems, network communications, operations
- Terminology and solutions often derived from defense industry
§ Cyber security includes offensive capabilities
- The use of IT to respond to threats by attacking adversaries
§ Why spray RAID to kill what you see when you can spread ant
honey that is carried back to the nest and destroys the colony?
- Historically government domain, emerging enterprise capability
§ The dog in the night that has not yet barked?
- Often likened to insurance, today compared to braking systems
that enable high-performance cars to go faster
4
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Security Cycles & Investor Appetite:
Generations of Cyber Security
§ Before the Web: early viruses, LANs, PCs, floppy disks
-  Limited access, isolated networks, slow propagation of threat
§ 1993: Mosaic and the rise of the commercial Internet (FUD 1.0)
-  First generation of program code travelling across the ‘net
§ 2000: dot-com bubble burst (double-digit sec spend as % of IT)
-  Most IT spend slowed but Internet on-ramp required cyber security
§ 2002: inflection point (FUD 1.5)
-  Global technology companies proclaim commitment to security (MSFT, CSCO, CA)
§ 2005: consumer Internet distraction
-  Web 2.0, the rise of social media, industrial disintermediation, $50K startups
§ 2008: global economic crash
-  No appetite for enterprise infrastructure solutions (IT budget squeeze)
§ 2011: media focus on all things cyber (FUD 2.0)
-  Plus emerging pressure from mobile personal device (smartphone) market
§ 2013: Snowden and the fragility of the Internet (anti-FUD?)
-  Risk becomes real, NSA disclosure become personal, Target breach impacts CxOs
5
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Two Real Cyber Security Drivers
§ Governments and corporations are under attack
- Cyber hack problem is no longer simply a nuisance
§ litigation and criminal complaints based on weak systems of
control and the lack of reasonable cyber security strategy
- Snowden was sensational but NSA snooping was personal
§ validated and went beyond what experts thought was possible
- 05/2014 DoJ China nation-state industrial espionage disclosure
§ aggressive government-sponsored electronic espionage
against corporations (and other governments)
§ Direct impact on executive officer careers
- Convergence of risk following Target, Niemen Marcus, and other
well publicized breaches (impact broad, shockwaves resonate)
- IT budgets again being freed-up for the development of new
products, services which require strengthening of digital defenses
6
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Businesses Under Fire
§ Organizations are exposed more than ever
- Increasing number and variety of threats and risks
- New attacks - targeted and purposeful
§ Hackers are stealing around $250B/year in IP
- NSA Director, Gen. Keith Alexander, calls these attacks "the
greatest wealth transfer in history"
§ Significant YoY increases in cyber attacks
- DHS reported a 68% increase in cyber attacks in 2012 at federal
agencies, government partners, and against critical infrastructure
- Symantec reported attacks on companies rose 42% in 2012
§ U.S. government is increasing spending in cyber
security (despite cuts elsewhere)
7
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Macro Cyber Security Topics
§ Cloud Computing: Data Center Security Redefined
-  Distributed Control, Ownership of Data Assets
§ Advanced Persistent Threats (Network & End-Point)
-  Detect and Contain Sophisticated and Targeted Attacks
-  Intelligence Dissemination and Threat Remediation
§ Mobility and Device Security
-  Secure Mobile Applications, Consumerization (BYOD)
§ Risk Management
-  Regulatory, Integrity, Compliance, Business Continuity, Social Media
§ Identity & Access Management
-  Authentication, Authorization, Access Control
§ Verticalization: Security with a Sector / Industry Focus
-  No longer one-size-fits all: industries (govt., healthcare, finserv,
energy & utilities, oil & gas, manufacturing, education) are
demanding solutions more attune with their unique challenges
8
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Gartner Nexus of Forces
§ Pervasive Access
- mobile
§ Global Delivery
- cloud
§ Big Context
- information
§ Extreme Behavior
- social
9
A tsunami of change rocking the IT world (David Cowen, Bessemer)
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Cyber Security Trends (1 of 3)
§ Enhanced use of encryption
- more careful attention to the maintenance and proper
configuration of existing encryption systems
§ Increased scrutiny of internal data use
- behavioral analytic technologies to monitor users within the
company as well as end users accessing company apps
- increasing alerts (situational awareness) around suspicious
behavior that accompanies theft or attack with malware
§ Resistance to cloud technology
- huge rewards for companies and end users in terms of efficiency
and access to both information and applications
- offset by security liabilities that accompany cloud technology and
create a drag on the speed of adoption (cybersec ≈ car brakes)
10
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Cyber Security Trends (2 of 3)
§ Risk assessment and software analysis
- front-line (but back-office) defenses such as screening software
for vulnerabilities, keeping software up-to-date (patched) to
avoid known weaknesses, improved exercising of software
- better engineering due to secure coding standards and practices
§ More destructive attacks
- real damage to computer systems and stored data from targeted
attacks launched by political and cause-focused hacktivist groups
§ Rising levels of smartphone malware
- more security efforts directed to mobile platforms and biz apps
§ Phishing and hacking of individual users
- access to account credentials while avoiding sophisticated
enterprise security measures (people are the weakest link)
11
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Cyber Security Trends (3 of 3)
§ More sophisticated malware
- better encryption of and more sophisticated malicious code allow
attackers to evade virus detection and removal tools (AV dead?)
§ Active defense (honeypots and other traps)
- to convince hackers that they are in their target area, when
they’ve actually been diverted and trapped in a shell where they
can be easily identified and in some cases, retaliated against
§ Threat follow up (MSSP ≈ Associated Press model)
- requires manpower organizations don’t have so active monitoring
and maintenance by MSSPs and external forensics experts
§ Fast response (security and threat intelligence)*
- fraud tools and intelligence platforms to investigate, track and
analyze events post-facto with near real-time clarity (e-forensics)
and to make actionable information available to IT staff
12
*Security and threat intelligence is like teen sex …
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Money Follows Problems:
A Concentration of Risk
§ New threat vectors once again an obstacle to
Internet-fueled growth plans (mobile and cloud)
- So cash is being thrown at possible solutions
§ Security is in the conversation at the board level
- 80% of G2K reporting cyber security preparations to the board
§ Gartner estimates 39% increase in security spend:
- From $67B (in 2013) to $93B (in 2017)
§ Makes cyber security ripe for the harvest
- The 8.7% annual growth rate is compelling metric for investors
§ Cyberattack news onslaught is making a difference
- VCs move quickly to fund startups that could solve problems
discussed in cyberattack headlines
13
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Money Follows Problems:
A Cyber Security Boom?
§ The cyber security market is in a renaissance
-  Estimated global investment in private cyber security companies:
§  2011 cybersecurity funding was up 94% over 2010
§  2012 funding was estimated to have been $1.0B
§  In 2013, ~$1.5B was invested in ~240 cyber security startups
§ No end in sight
-  Likely in anticipation of a deal-making boom:
§  The average valuation for each VC round raised in 2013 rose by
41% over 2012 to $31.5 million
§  In comparison, the increase between 2011 and 2012 was 26%
§ Caveat emptor
-  Are we in or approaching a cyber security bubble?
§  Because cyber security private company valuations more than
doubled in past two years, there is an uneasy feeling.
§  Demands exceptional diligence and the art of the long view
14
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Money Follows Problems:
New Exit Opportunities
§ Mergers and Acquisitions (M&A)
-  23 cyber security M&A deals in 2013, 9 in Q1 2014, 8 in Q2 2014
§  Cisco ß NDS, ProofPoint ß Amortize Technologies, Blue Coat ß
Solera Networks, Cisco ß Sourcefire ($2.7B or ~10x annual
revenue), IBM ß Trusteer ($800M or ~10x annual revenue),
Fireeye ß Mandiant ($1B)
-  Average cyber security enterprise value / revenue multiple of 9.9x
§  Impressive but will always be dwarfed by consumer internet and
social media deals since cyber security growth and risk are lower
§ Initial Public Offering (IPO)
-  Palo Alto Networks, Imperva, Qualys, Baracuda, FireEye (hot $300M
IPO in September 2013 with $5B market cap today), Varonis, Cyber-
Ark (in process)
§ Private Equity Carve-Outs and Roll-Ups
-  $200M Insight (PE) bet on Airwatch (2013) followed by $1.5B
VMWare acquisition (2014)
15
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Money Follows Problems:
A Fragmented Market
§ No dominant leader
-  There is no single enterprise with a large enough share of the market
to be able to influence the industry’s direction
§  Symantec and McAfee, the two biggest players in the industry, are
followers and not leaders; they have been unable to influence
-  An acquisitive growth strategy that will position one company to
dominate the industry, like Cisco in the 1990s, remains a possibility
§ The increasing variety of threats …
-  Requires rapid innovation and short development cycles
§  a challenge for bigcos and an opportunity for nimble startups who
can carve out a market niche via unique products and services
§ Coddling via cyber-security focused initiatives
-  Mach37 Cybersecurity Accelerator (Virginia)
-  JVP National Cybersecurity Incubator (BGU, Beer Sheva)
-  Cisco Israel Cybersecurity Incubator (John Chambers, May 2013)
-  Lockheed Martin and GE cyber security R&D centers in Israel
16
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
On Cyber Security M&As
§ Multiples are at all-time high
-  Big players must buy revenue growth through acquisitions
-  M&A activity will remain high (energize brands, buy mkt. share)
§ Money pouring in but a VC pull-back is possible
-  Not likely in the near term but probable as value plays dry up
-  Great “A” tech but limited execution capability in “B” teams
§ IPO option open but consolidation will continue
-  Hackers thwart legacy solutions forcing innovation acquisitions
-  With limited growth-stage funding available, M&A activity jumps
§ M&A drivers
-  Integrated software suite leaders in need of innovation
-  Evolving platforms such as software-defined data centers
-  Online (cloud) service providers creating new security challenges
-  Non-traditional acquirers (outside or adjacent spaces or eco-system)
17
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Expertise Counts:
Finding the Winners
§ Domain expertise is key (for investors and buyers)
-  Does the team have deep backgrounds in the sector?
-  Do they understand how customers bought software in the past?
-  Do they know how they are buying now (the buying cycle)?
-  Do they understand how and what channels work?
-  Do they grasp the intricacies of and how pricing models work?
-  Do they know how to listen to customers and prioritize features?
§ Does the team really know its vertical market?
-  How many people really understand healthcare and cloud technology
and how to roll that out?
-  Do they understand their position in and are they attuned to nuances
of and know how to leverage their eco-system?
-  What do they know about their target customer and buyer and how
to access them?
-  Do they really understand and value their competitors and do they
have a legitimate “break-out” plan?
18
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Pre-Submitted Questions
§ What was the process to funding regarding traction of an
idea and or product?
-  Entrepreneur team commitment and full engagement: is this an “A” team?
-  Pitch review (new venture business plan outline): is this an “A” opportunity?
-  Initial meetings (phone, face-to-face) and vetting of team: can they execute?
-  Term sheet enables deep-dive (technical due diligence): is the solution real?
-  Customer (or prospect) and independent expert validation: is the market real?
-  Finally, is this something that can be explained clearly and is it exciting?
§ How were the first customers captured?
-  Street-fighting: Typically entrepreneurs leverage personal networks to secure
initial meetings and lock-in a sponsor or champion
§ What level of funding are they raising and what is the use of
funds?
-  If they’ve validated the solution and market and secured early adopters then
funds are typically for sales and marketing in the United States and $3M is the
recommended minimum gunpowder (above and beyond cost of maintaining
existing operations)
-  If they’ve not yet validated then $250K to $500K will typically allow them to
develop early prototypes, secure development partners, and validate some
basic assumptions (first milestone)
19
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Ron’s Radar
§ Encryption – it is time yet?
-  Secure communication – the need is not universal but timing is
relevant: Silent Circle (Zimmerman’s PGP reboot)*, Wikr (message
self-destruction), Threema (encrypted What’s App)
-  Protecting the data inside the cloud and in transit – security, policy
carried w/data (Vaultive, Porticor, Covertix)
§ Cloud-based security services – enabling the cloud
-  Easier to deploy, cheaper to manage, code is always up-to-date
-  Correlation of data from multiple incidents (SumoLogic, CTCH)
-  Web site security and acceleration (Fireblade)
§ Threat intelligence – needle in the haystack
-  Cylance, ThreatMetrix and Seculert are examples
§ Fraud-prevention – sensor-supported policies
-  Transaction decisions based on more than user ID and password like
geo-location input (XYVerify) and continuous authentication of users
throughout transaction session (BioCatch)
-  Device fingerprinting/reputation and big-data analysis (Iovation)
20
*Just raised $30M to develop a “blackphone”
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Big Data will Revolutionize the
Future of Cyber Security
§ Big data offers intelligence-driven models
-  Analytics will play key role in detecting crime, security infractions
§ Big data analytics à Bigger threat map = TMI
-  Enables enterprises to combine and correlate external and internal information
to better assess threats to them and their industry
§ Data analysis evolution enables advances in predictive
capabilities and real-time decision automation
-  Moving closer to precognition (science imitates art: “Minority Report”)
-  Gartner claims that by 2016, more than 25% of global firms will adopt big
data analytics for at least one security and fraud detection use case (such as
detection of advanced threats, insider threats and account takeover) up from
current 8%
§ Big data will change most of the product categories in the
field of computer security (but we’re in the early days)
-  Impact on all existing solutions (conventional firewalls, anti-malware, data
loss prevention, network monitoring, authentication and authorization of
users, identity management, fraud detection, systems of governance, risk and
compliance, etc.)
-  Disruption creates all sorts of opportunities for emerging tech companies
-  Result is ongoing industry fragmentation, no dominant market share leader
21
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
“Character is much easier kept
than recovered”
§ Security still a knee-jerk reaction to an attack
- Spend not correlated to revenue (or direct expense reduction)
- BYOD as an example
§ IT infra security still a one-time, ad hoc effort
- But more security is now embedded within daily operations
§ Security as a broad collection of technologies
- Still not an inherent, proactive and continual aspect of
governance
§ Cybersecurity never gets solved
- Like an antibiotic-resistant bacteria: attackers adapt to defenses
and render them obsolete (David Cowen, Bessemer)
22
Thomas Paine, US patriot & political philosopher (1737 - 1809)
The Cyber Security Landscape
An OurCrowd Briefing
Ron Moritz
Managing Director, MTC Venture Consulting
+972 72 272 4450
+1 650 618 9560
Ron@Moritz.US
@RonMoritz
http://www.il.linkedin.com/in/ronmoritz/
Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Questions about OurCrowd
24
Any Questions?
For feedback or more
information:
Zack@ourcrowd.com
https://www.ourcrowd.com/

Mais conteúdo relacionado

Mais procurados

Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionPECB
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 

Mais procurados (20)

Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Destaque

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...OurCrowd
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
IPOs: How they work and what they mean for your portfolio
IPOs: How they work and what they mean for your portfolioIPOs: How they work and what they mean for your portfolio
IPOs: How they work and what they mean for your portfolioOurCrowd
 
Everything You Need to Know about Preemptive Rights
Everything You Need to Know about Preemptive RightsEverything You Need to Know about Preemptive Rights
Everything You Need to Know about Preemptive RightsOurCrowd
 
OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...
OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...
OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...OurCrowd
 
Crowdfunding Platform OurCrowd - General Electric Partnership
Crowdfunding Platform OurCrowd - General Electric PartnershipCrowdfunding Platform OurCrowd - General Electric Partnership
Crowdfunding Platform OurCrowd - General Electric PartnershipCrowdfund Productions, LLC
 
The Investor's Guide to the Israel Enterprise Software Industry
The Investor's Guide to the Israel Enterprise Software IndustryThe Investor's Guide to the Israel Enterprise Software Industry
The Investor's Guide to the Israel Enterprise Software IndustryOurCrowd
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCWill O'Brien
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementInfo-Tech Research Group
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Webinar: Q&A with XPRIZE and HeroX founders
Webinar: Q&A with XPRIZE and HeroX foundersWebinar: Q&A with XPRIZE and HeroX founders
Webinar: Q&A with XPRIZE and HeroX foundersOurCrowd
 
Deal marketing on the internet: Using Software to Find Investors and Sell You...
Deal marketing on the internet: Using Software to Find Investors and Sell You...Deal marketing on the internet: Using Software to Find Investors and Sell You...
Deal marketing on the internet: Using Software to Find Investors and Sell You...OurCrowd
 
Cashing in - how to make money investing in startups
Cashing in  - how to make money investing in startupsCashing in  - how to make money investing in startups
Cashing in - how to make money investing in startupsOurCrowd
 
Commercialising your New Idea workshop
Commercialising your New Idea workshopCommercialising your New Idea workshop
Commercialising your New Idea workshopBusinessVictoria
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsSophos Benelux
 
The Changing Relationship Between Investors and Investments
The Changing Relationship Between Investors and Investments The Changing Relationship Between Investors and Investments
The Changing Relationship Between Investors and Investments OurCrowd
 
Fundraising Guide for Early Stage Startups
Fundraising Guide for Early Stage StartupsFundraising Guide for Early Stage Startups
Fundraising Guide for Early Stage StartupsScott Sage
 

Destaque (20)

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
IPOs: How they work and what they mean for your portfolio
IPOs: How they work and what they mean for your portfolioIPOs: How they work and what they mean for your portfolio
IPOs: How they work and what they mean for your portfolio
 
Everything You Need to Know about Preemptive Rights
Everything You Need to Know about Preemptive RightsEverything You Need to Know about Preemptive Rights
Everything You Need to Know about Preemptive Rights
 
OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...
OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...
OurCrowd's Portfolio RESERVE: Making investing easier by putting the investme...
 
Crowdfunding Platform OurCrowd - General Electric Partnership
Crowdfunding Platform OurCrowd - General Electric PartnershipCrowdfunding Platform OurCrowd - General Electric Partnership
Crowdfunding Platform OurCrowd - General Electric Partnership
 
The Investor's Guide to the Israel Enterprise Software Industry
The Investor's Guide to the Israel Enterprise Software IndustryThe Investor's Guide to the Israel Enterprise Software Industry
The Investor's Guide to the Israel Enterprise Software Industry
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event Management
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Angel Investing Workshop
Angel Investing WorkshopAngel Investing Workshop
Angel Investing Workshop
 
Webinar: Q&A with XPRIZE and HeroX founders
Webinar: Q&A with XPRIZE and HeroX foundersWebinar: Q&A with XPRIZE and HeroX founders
Webinar: Q&A with XPRIZE and HeroX founders
 
Deal marketing on the internet: Using Software to Find Investors and Sell You...
Deal marketing on the internet: Using Software to Find Investors and Sell You...Deal marketing on the internet: Using Software to Find Investors and Sell You...
Deal marketing on the internet: Using Software to Find Investors and Sell You...
 
Cashing in - how to make money investing in startups
Cashing in  - how to make money investing in startupsCashing in  - how to make money investing in startups
Cashing in - how to make money investing in startups
 
Commercialising your New Idea workshop
Commercialising your New Idea workshopCommercialising your New Idea workshop
Commercialising your New Idea workshop
 
Vendor Landscape: Email Security Gateway
Vendor Landscape: Email Security GatewayVendor Landscape: Email Security Gateway
Vendor Landscape: Email Security Gateway
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
 
The Changing Relationship Between Investors and Investments
The Changing Relationship Between Investors and Investments The Changing Relationship Between Investors and Investments
The Changing Relationship Between Investors and Investments
 
Fundraising Guide for Early Stage Startups
Fundraising Guide for Early Stage StartupsFundraising Guide for Early Stage Startups
Fundraising Guide for Early Stage Startups
 

Semelhante a The Cyber Security Landscape: An OurCrowd Briefing for Investors

Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?OurCrowd
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's AdvantageRaffael Marty
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Inno Eroraha [NetSecurity]
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issueSonaliG6
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
 

Semelhante a The Cyber Security Landscape: An OurCrowd Briefing for Investors (20)

Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 
C018131821
C018131821C018131821
C018131821
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 

Mais de OurCrowd

[ACA webinar] Investor Experiences with Online Equity Platforms
[ACA webinar] Investor Experiences with Online Equity Platforms[ACA webinar] Investor Experiences with Online Equity Platforms
[ACA webinar] Investor Experiences with Online Equity PlatformsOurCrowd
 
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3OurCrowd
 
InvestHK and OurCrowd
InvestHK and OurCrowdInvestHK and OurCrowd
InvestHK and OurCrowdOurCrowd
 
FrieghtOS and OurCrowd
FrieghtOS and OurCrowdFrieghtOS and OurCrowd
FrieghtOS and OurCrowdOurCrowd
 
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...OurCrowd
 
Investment Trends: Where to invest your attention in 2015
Investment Trends: Where to invest your attention in 2015 Investment Trends: Where to invest your attention in 2015
Investment Trends: Where to invest your attention in 2015 OurCrowd
 
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...OurCrowd
 
OurCrowd 2014 Year in Review
OurCrowd 2014 Year in ReviewOurCrowd 2014 Year in Review
OurCrowd 2014 Year in ReviewOurCrowd
 
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...OurCrowd
 
The changing face of the American Investor: Tools, Advice, and Do It Yourself...
The changing face of the American Investor: Tools, Advice, and Do It Yourself...The changing face of the American Investor: Tools, Advice, and Do It Yourself...
The changing face of the American Investor: Tools, Advice, and Do It Yourself...OurCrowd
 
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech Scene
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech SceneFrom the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech Scene
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech SceneOurCrowd
 
M&A and IPO Activity of Israeli companies, 1H 2014
M&A and IPO Activity of Israeli companies, 1H 2014M&A and IPO Activity of Israeli companies, 1H 2014
M&A and IPO Activity of Israeli companies, 1H 2014OurCrowd
 
Investing in fintech: Trends in financial technology for investors and entrep...
Investing in fintech: Trends in financial technology for investors and entrep...Investing in fintech: Trends in financial technology for investors and entrep...
Investing in fintech: Trends in financial technology for investors and entrep...OurCrowd
 
History of Online Investing
History of Online InvestingHistory of Online Investing
History of Online InvestingOurCrowd
 
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the Moon
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the MoonPresented by OurCrowd: The SpaceIL Story and the Israeli Race to the Moon
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the MoonOurCrowd
 
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...OurCrowd
 
Crowdfunding Panel at Harvard Business School (Dec 4, 2013)
Crowdfunding Panel at Harvard Business School (Dec 4, 2013)Crowdfunding Panel at Harvard Business School (Dec 4, 2013)
Crowdfunding Panel at Harvard Business School (Dec 4, 2013)OurCrowd
 
New Rules on General Solicitation
New Rules on General SolicitationNew Rules on General Solicitation
New Rules on General SolicitationOurCrowd
 
The 1st rule in startup investing: How investors lower risk and boost returns...
The 1st rule in startup investing: How investors lower risk and boost returns...The 1st rule in startup investing: How investors lower risk and boost returns...
The 1st rule in startup investing: How investors lower risk and boost returns...OurCrowd
 

Mais de OurCrowd (19)

[ACA webinar] Investor Experiences with Online Equity Platforms
[ACA webinar] Investor Experiences with Online Equity Platforms[ACA webinar] Investor Experiences with Online Equity Platforms
[ACA webinar] Investor Experiences with Online Equity Platforms
 
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3
Conquering The Term Sheet Everything You Need To Know About Deal Terms Part 3
 
InvestHK and OurCrowd
InvestHK and OurCrowdInvestHK and OurCrowd
InvestHK and OurCrowd
 
FrieghtOS and OurCrowd
FrieghtOS and OurCrowdFrieghtOS and OurCrowd
FrieghtOS and OurCrowd
 
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...
Recipe for Retail Sector Success: Q&A with Andrew Heyer, Jamba Juice Investor...
 
Investment Trends: Where to invest your attention in 2015
Investment Trends: Where to invest your attention in 2015 Investment Trends: Where to invest your attention in 2015
Investment Trends: Where to invest your attention in 2015
 
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...
The State of Online Lending: Q&A with Dan Ciporin, Lending Club & Borro Inves...
 
OurCrowd 2014 Year in Review
OurCrowd 2014 Year in ReviewOurCrowd 2014 Year in Review
OurCrowd 2014 Year in Review
 
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...
Rise of the Robo Advisors: The Growing Trend of Automating Asset Allocation S...
 
The changing face of the American Investor: Tools, Advice, and Do It Yourself...
The changing face of the American Investor: Tools, Advice, and Do It Yourself...The changing face of the American Investor: Tools, Advice, and Do It Yourself...
The changing face of the American Investor: Tools, Advice, and Do It Yourself...
 
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech Scene
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech SceneFrom the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech Scene
From the Trenches to Traction: How Unit 8200 is Transforming Israel's Tech Scene
 
M&A and IPO Activity of Israeli companies, 1H 2014
M&A and IPO Activity of Israeli companies, 1H 2014M&A and IPO Activity of Israeli companies, 1H 2014
M&A and IPO Activity of Israeli companies, 1H 2014
 
Investing in fintech: Trends in financial technology for investors and entrep...
Investing in fintech: Trends in financial technology for investors and entrep...Investing in fintech: Trends in financial technology for investors and entrep...
Investing in fintech: Trends in financial technology for investors and entrep...
 
History of Online Investing
History of Online InvestingHistory of Online Investing
History of Online Investing
 
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the Moon
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the MoonPresented by OurCrowd: The SpaceIL Story and the Israeli Race to the Moon
Presented by OurCrowd: The SpaceIL Story and the Israeli Race to the Moon
 
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
 
Crowdfunding Panel at Harvard Business School (Dec 4, 2013)
Crowdfunding Panel at Harvard Business School (Dec 4, 2013)Crowdfunding Panel at Harvard Business School (Dec 4, 2013)
Crowdfunding Panel at Harvard Business School (Dec 4, 2013)
 
New Rules on General Solicitation
New Rules on General SolicitationNew Rules on General Solicitation
New Rules on General Solicitation
 
The 1st rule in startup investing: How investors lower risk and boost returns...
The 1st rule in startup investing: How investors lower risk and boost returns...The 1st rule in startup investing: How investors lower risk and boost returns...
The 1st rule in startup investing: How investors lower risk and boost returns...
 

Último

Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Último (20)

Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

The Cyber Security Landscape: An OurCrowd Briefing for Investors

  • 1. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 1 The Cyber Security Landscape An OurCrowd Briefing Ron Moritz 27 May 2014
  • 2. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Your hosts 2 Zack Miller Head of investor community @OurCrowd Ron Moritz Advisor, consultant and OurCrowd mentor
  • 3. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. OurCrowd’s portfolio 3 Cyber Security companies in our portfolio
  • 4. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. What is Cyber Security? § Cyber security – the evolution of a name - EDP controls à IT audit à IT security à computer security à network security à OT security à cyber security - Practices, tools and concepts dealing with CIA § CIA: confidentiality, integrity, and availability of information § But also CIA of systems, network communications, operations - Terminology and solutions often derived from defense industry § Cyber security includes offensive capabilities - The use of IT to respond to threats by attacking adversaries § Why spray RAID to kill what you see when you can spread ant honey that is carried back to the nest and destroys the colony? - Historically government domain, emerging enterprise capability § The dog in the night that has not yet barked? - Often likened to insurance, today compared to braking systems that enable high-performance cars to go faster 4
  • 5. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Security Cycles & Investor Appetite: Generations of Cyber Security § Before the Web: early viruses, LANs, PCs, floppy disks -  Limited access, isolated networks, slow propagation of threat § 1993: Mosaic and the rise of the commercial Internet (FUD 1.0) -  First generation of program code travelling across the ‘net § 2000: dot-com bubble burst (double-digit sec spend as % of IT) -  Most IT spend slowed but Internet on-ramp required cyber security § 2002: inflection point (FUD 1.5) -  Global technology companies proclaim commitment to security (MSFT, CSCO, CA) § 2005: consumer Internet distraction -  Web 2.0, the rise of social media, industrial disintermediation, $50K startups § 2008: global economic crash -  No appetite for enterprise infrastructure solutions (IT budget squeeze) § 2011: media focus on all things cyber (FUD 2.0) -  Plus emerging pressure from mobile personal device (smartphone) market § 2013: Snowden and the fragility of the Internet (anti-FUD?) -  Risk becomes real, NSA disclosure become personal, Target breach impacts CxOs 5
  • 6. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Two Real Cyber Security Drivers § Governments and corporations are under attack - Cyber hack problem is no longer simply a nuisance § litigation and criminal complaints based on weak systems of control and the lack of reasonable cyber security strategy - Snowden was sensational but NSA snooping was personal § validated and went beyond what experts thought was possible - 05/2014 DoJ China nation-state industrial espionage disclosure § aggressive government-sponsored electronic espionage against corporations (and other governments) § Direct impact on executive officer careers - Convergence of risk following Target, Niemen Marcus, and other well publicized breaches (impact broad, shockwaves resonate) - IT budgets again being freed-up for the development of new products, services which require strengthening of digital defenses 6
  • 7. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Businesses Under Fire § Organizations are exposed more than ever - Increasing number and variety of threats and risks - New attacks - targeted and purposeful § Hackers are stealing around $250B/year in IP - NSA Director, Gen. Keith Alexander, calls these attacks "the greatest wealth transfer in history" § Significant YoY increases in cyber attacks - DHS reported a 68% increase in cyber attacks in 2012 at federal agencies, government partners, and against critical infrastructure - Symantec reported attacks on companies rose 42% in 2012 § U.S. government is increasing spending in cyber security (despite cuts elsewhere) 7
  • 8. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Macro Cyber Security Topics § Cloud Computing: Data Center Security Redefined -  Distributed Control, Ownership of Data Assets § Advanced Persistent Threats (Network & End-Point) -  Detect and Contain Sophisticated and Targeted Attacks -  Intelligence Dissemination and Threat Remediation § Mobility and Device Security -  Secure Mobile Applications, Consumerization (BYOD) § Risk Management -  Regulatory, Integrity, Compliance, Business Continuity, Social Media § Identity & Access Management -  Authentication, Authorization, Access Control § Verticalization: Security with a Sector / Industry Focus -  No longer one-size-fits all: industries (govt., healthcare, finserv, energy & utilities, oil & gas, manufacturing, education) are demanding solutions more attune with their unique challenges 8
  • 9. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Gartner Nexus of Forces § Pervasive Access - mobile § Global Delivery - cloud § Big Context - information § Extreme Behavior - social 9 A tsunami of change rocking the IT world (David Cowen, Bessemer)
  • 10. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Cyber Security Trends (1 of 3) § Enhanced use of encryption - more careful attention to the maintenance and proper configuration of existing encryption systems § Increased scrutiny of internal data use - behavioral analytic technologies to monitor users within the company as well as end users accessing company apps - increasing alerts (situational awareness) around suspicious behavior that accompanies theft or attack with malware § Resistance to cloud technology - huge rewards for companies and end users in terms of efficiency and access to both information and applications - offset by security liabilities that accompany cloud technology and create a drag on the speed of adoption (cybersec ≈ car brakes) 10
  • 11. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Cyber Security Trends (2 of 3) § Risk assessment and software analysis - front-line (but back-office) defenses such as screening software for vulnerabilities, keeping software up-to-date (patched) to avoid known weaknesses, improved exercising of software - better engineering due to secure coding standards and practices § More destructive attacks - real damage to computer systems and stored data from targeted attacks launched by political and cause-focused hacktivist groups § Rising levels of smartphone malware - more security efforts directed to mobile platforms and biz apps § Phishing and hacking of individual users - access to account credentials while avoiding sophisticated enterprise security measures (people are the weakest link) 11
  • 12. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Cyber Security Trends (3 of 3) § More sophisticated malware - better encryption of and more sophisticated malicious code allow attackers to evade virus detection and removal tools (AV dead?) § Active defense (honeypots and other traps) - to convince hackers that they are in their target area, when they’ve actually been diverted and trapped in a shell where they can be easily identified and in some cases, retaliated against § Threat follow up (MSSP ≈ Associated Press model) - requires manpower organizations don’t have so active monitoring and maintenance by MSSPs and external forensics experts § Fast response (security and threat intelligence)* - fraud tools and intelligence platforms to investigate, track and analyze events post-facto with near real-time clarity (e-forensics) and to make actionable information available to IT staff 12 *Security and threat intelligence is like teen sex …
  • 13. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: A Concentration of Risk § New threat vectors once again an obstacle to Internet-fueled growth plans (mobile and cloud) - So cash is being thrown at possible solutions § Security is in the conversation at the board level - 80% of G2K reporting cyber security preparations to the board § Gartner estimates 39% increase in security spend: - From $67B (in 2013) to $93B (in 2017) § Makes cyber security ripe for the harvest - The 8.7% annual growth rate is compelling metric for investors § Cyberattack news onslaught is making a difference - VCs move quickly to fund startups that could solve problems discussed in cyberattack headlines 13
  • 14. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: A Cyber Security Boom? § The cyber security market is in a renaissance -  Estimated global investment in private cyber security companies: §  2011 cybersecurity funding was up 94% over 2010 §  2012 funding was estimated to have been $1.0B §  In 2013, ~$1.5B was invested in ~240 cyber security startups § No end in sight -  Likely in anticipation of a deal-making boom: §  The average valuation for each VC round raised in 2013 rose by 41% over 2012 to $31.5 million §  In comparison, the increase between 2011 and 2012 was 26% § Caveat emptor -  Are we in or approaching a cyber security bubble? §  Because cyber security private company valuations more than doubled in past two years, there is an uneasy feeling. §  Demands exceptional diligence and the art of the long view 14
  • 15. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: New Exit Opportunities § Mergers and Acquisitions (M&A) -  23 cyber security M&A deals in 2013, 9 in Q1 2014, 8 in Q2 2014 §  Cisco ß NDS, ProofPoint ß Amortize Technologies, Blue Coat ß Solera Networks, Cisco ß Sourcefire ($2.7B or ~10x annual revenue), IBM ß Trusteer ($800M or ~10x annual revenue), Fireeye ß Mandiant ($1B) -  Average cyber security enterprise value / revenue multiple of 9.9x §  Impressive but will always be dwarfed by consumer internet and social media deals since cyber security growth and risk are lower § Initial Public Offering (IPO) -  Palo Alto Networks, Imperva, Qualys, Baracuda, FireEye (hot $300M IPO in September 2013 with $5B market cap today), Varonis, Cyber- Ark (in process) § Private Equity Carve-Outs and Roll-Ups -  $200M Insight (PE) bet on Airwatch (2013) followed by $1.5B VMWare acquisition (2014) 15
  • 16. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Money Follows Problems: A Fragmented Market § No dominant leader -  There is no single enterprise with a large enough share of the market to be able to influence the industry’s direction §  Symantec and McAfee, the two biggest players in the industry, are followers and not leaders; they have been unable to influence -  An acquisitive growth strategy that will position one company to dominate the industry, like Cisco in the 1990s, remains a possibility § The increasing variety of threats … -  Requires rapid innovation and short development cycles §  a challenge for bigcos and an opportunity for nimble startups who can carve out a market niche via unique products and services § Coddling via cyber-security focused initiatives -  Mach37 Cybersecurity Accelerator (Virginia) -  JVP National Cybersecurity Incubator (BGU, Beer Sheva) -  Cisco Israel Cybersecurity Incubator (John Chambers, May 2013) -  Lockheed Martin and GE cyber security R&D centers in Israel 16
  • 17. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. On Cyber Security M&As § Multiples are at all-time high -  Big players must buy revenue growth through acquisitions -  M&A activity will remain high (energize brands, buy mkt. share) § Money pouring in but a VC pull-back is possible -  Not likely in the near term but probable as value plays dry up -  Great “A” tech but limited execution capability in “B” teams § IPO option open but consolidation will continue -  Hackers thwart legacy solutions forcing innovation acquisitions -  With limited growth-stage funding available, M&A activity jumps § M&A drivers -  Integrated software suite leaders in need of innovation -  Evolving platforms such as software-defined data centers -  Online (cloud) service providers creating new security challenges -  Non-traditional acquirers (outside or adjacent spaces or eco-system) 17
  • 18. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Expertise Counts: Finding the Winners § Domain expertise is key (for investors and buyers) -  Does the team have deep backgrounds in the sector? -  Do they understand how customers bought software in the past? -  Do they know how they are buying now (the buying cycle)? -  Do they understand how and what channels work? -  Do they grasp the intricacies of and how pricing models work? -  Do they know how to listen to customers and prioritize features? § Does the team really know its vertical market? -  How many people really understand healthcare and cloud technology and how to roll that out? -  Do they understand their position in and are they attuned to nuances of and know how to leverage their eco-system? -  What do they know about their target customer and buyer and how to access them? -  Do they really understand and value their competitors and do they have a legitimate “break-out” plan? 18
  • 19. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Pre-Submitted Questions § What was the process to funding regarding traction of an idea and or product? -  Entrepreneur team commitment and full engagement: is this an “A” team? -  Pitch review (new venture business plan outline): is this an “A” opportunity? -  Initial meetings (phone, face-to-face) and vetting of team: can they execute? -  Term sheet enables deep-dive (technical due diligence): is the solution real? -  Customer (or prospect) and independent expert validation: is the market real? -  Finally, is this something that can be explained clearly and is it exciting? § How were the first customers captured? -  Street-fighting: Typically entrepreneurs leverage personal networks to secure initial meetings and lock-in a sponsor or champion § What level of funding are they raising and what is the use of funds? -  If they’ve validated the solution and market and secured early adopters then funds are typically for sales and marketing in the United States and $3M is the recommended minimum gunpowder (above and beyond cost of maintaining existing operations) -  If they’ve not yet validated then $250K to $500K will typically allow them to develop early prototypes, secure development partners, and validate some basic assumptions (first milestone) 19
  • 20. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Ron’s Radar § Encryption – it is time yet? -  Secure communication – the need is not universal but timing is relevant: Silent Circle (Zimmerman’s PGP reboot)*, Wikr (message self-destruction), Threema (encrypted What’s App) -  Protecting the data inside the cloud and in transit – security, policy carried w/data (Vaultive, Porticor, Covertix) § Cloud-based security services – enabling the cloud -  Easier to deploy, cheaper to manage, code is always up-to-date -  Correlation of data from multiple incidents (SumoLogic, CTCH) -  Web site security and acceleration (Fireblade) § Threat intelligence – needle in the haystack -  Cylance, ThreatMetrix and Seculert are examples § Fraud-prevention – sensor-supported policies -  Transaction decisions based on more than user ID and password like geo-location input (XYVerify) and continuous authentication of users throughout transaction session (BioCatch) -  Device fingerprinting/reputation and big-data analysis (Iovation) 20 *Just raised $30M to develop a “blackphone”
  • 21. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Big Data will Revolutionize the Future of Cyber Security § Big data offers intelligence-driven models -  Analytics will play key role in detecting crime, security infractions § Big data analytics à Bigger threat map = TMI -  Enables enterprises to combine and correlate external and internal information to better assess threats to them and their industry § Data analysis evolution enables advances in predictive capabilities and real-time decision automation -  Moving closer to precognition (science imitates art: “Minority Report”) -  Gartner claims that by 2016, more than 25% of global firms will adopt big data analytics for at least one security and fraud detection use case (such as detection of advanced threats, insider threats and account takeover) up from current 8% § Big data will change most of the product categories in the field of computer security (but we’re in the early days) -  Impact on all existing solutions (conventional firewalls, anti-malware, data loss prevention, network monitoring, authentication and authorization of users, identity management, fraud detection, systems of governance, risk and compliance, etc.) -  Disruption creates all sorts of opportunities for emerging tech companies -  Result is ongoing industry fragmentation, no dominant market share leader 21
  • 22. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. “Character is much easier kept than recovered” § Security still a knee-jerk reaction to an attack - Spend not correlated to revenue (or direct expense reduction) - BYOD as an example § IT infra security still a one-time, ad hoc effort - But more security is now embedded within daily operations § Security as a broad collection of technologies - Still not an inherent, proactive and continual aspect of governance § Cybersecurity never gets solved - Like an antibiotic-resistant bacteria: attackers adapt to defenses and render them obsolete (David Cowen, Bessemer) 22 Thomas Paine, US patriot & political philosopher (1737 - 1809)
  • 23. The Cyber Security Landscape An OurCrowd Briefing Ron Moritz Managing Director, MTC Venture Consulting +972 72 272 4450 +1 650 618 9560 Ron@Moritz.US @RonMoritz http://www.il.linkedin.com/in/ronmoritz/
  • 24. Copyright ©2014 MTC. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. Questions about OurCrowd 24 Any Questions? For feedback or more information: Zack@ourcrowd.com https://www.ourcrowd.com/