SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
© PAC
Show me the money!
Evaluating Market Opportunities in Cyber Security
2014
PAC Webinar
© PAC 2014Show me the Money! - The Market Opportunity in Cyber Security
Your questions are
welcome!!
Duncan Brown
Director, Cyber Security
PAC UK
Mathieu Poujol
Principal Consultant
Cyber Security &
Infrastructures
PAC Group
Today’s Presenters
2
© PAC
Scope definitions
PAC definition: Cyber security is defined as technology, services and policies
that protect public sector and commercial organizations from the risk of
electronic attacks in order to minimize business disruption.
Cyber security is mostly an infrastructure- and middleware-based market,
but it impacts all ICT systems, from network to business applications.
2014Show me the Money! - The Market Opportunity in Cyber Security3
© PAC
Cyber security market segments
2014Show me the Money! - The Market Opportunity in Cyber Security4
Cyber security segments
The is no digital economy without digital trust
© PAC
Market size
2014Show me the Money! - The Market Opportunity in Cyber Security5
Total Security IT Services and Software Market Size 2013 and Growth Trends 2013-2017
1.7bn
1.7bn
1.4bn
+8.4%
+8.5%
+6.5%
+7.0%
Some Territories by Market Size Some Territories by Growth
All figures in Euros
31.5bn
12.1bn
8.8%
Worldwide Market Size Worldwide Market Growth
© PAC
Main trends
●  The advent of the digital economy around cloud and mobility has boosted a softer, more
open IT security perimeter.
●  The need of a holistic and converged approach across all IT area.
●  The core, the critical part of the IT systems, needs to be hardened:
ü The coconut has to give way to the mango.
●  Security needs to focus more strongly on the data and business side than on IT
infrastructures, as was the case before.
●  Infrastructure security remains mandatory.
●  Global security governance to master complexity
●  The market is maturing fast, from a specialist-driven approach to a more generalist
approach.
●  Government actions and investment are critical in this market.
20146 Show me the Money! - The Market Opportunity in Cyber Security
© PAC
boosters
The economy &
discretionary spend
Skill
shortages
New technologies &
deperimeterisation
Regulation &
compliance
Increasing threat
landscape
!"
2014Show me the Money! - The Market Opportunity in Cyber Security7
$ £ ¥ € ¢
Fragmented
legislation
Market dampers
© PAC 2014
Market players
Local specialistsIT services generalists Defence contractors
Technology vendorsConsultancies Telecoms specialists8
© PAC
Is security too hard for CISOs?
● Manage the increasing complexity of business and IT systems
● Complexity of the threat landscape, too many solutions, more
attacks that are more complex etc.
● Lack of resources constraining budget and efficiency
● Increasing pressure from businesses, regulators and governments
2014Show me the Money! - The Market Opportunity in Cyber Security9
© PAC 2014
Market implications
Rate of
adoption
Show me the Money! - The Market Opportunity in Cyber Security
Integrated security solutions
Managed services
20182013 2014 2015 2016 2017
Data-led governance
2014Show me the Money! - The Market Opportunity in Cyber Security © PAC10
© PAC
Security services market structure
2014Show me the Money! - The Market Opportunity in Cyber Security11
Managed security services
Discrete C&SI security projects
Advisory services (GRC, technology trends, etc.)
Cloud-based security services (Syaas)
Embedded C&SI security input
© PAC
Growth opportunities – services
Position cyber security at the heart of your offerings
•  It’s not a nice-to-have
•  It’s an enabler for SMAC, DT, and compliance
•  Top-down approach: from risk to vulnerabilities to tools
Offer an integrated suite of products that provide a
comprehensive view of security posture
•  Multiple software vendor partnerships are inevitable – today
•  You’ll probably have to do the integration yourself
•  Security is part of a bigger picture that contains business
continuity and risk management
Cyber security is not an isolated silo
•  Asset and system management
•  From business to infrastructure
2014Show me the Money! - The Market Opportunity in Cyber Security12
© PAC
Growth challenges – services
2014Show me the Money! - The Market Opportunity in Cyber Security13
Achieve scale quickly – eat or be eaten
• M&A is firmly on the agenda
• Numerous cyber security boutiques exist, with a footprint in
local markets
Liaise with governments
• Cyber security market depends on local regulations,
certifications, etc.
The battle is in the professional services, SI
and consulting space
• Consulting and event/threat intelligence are must-haves
• MSS will be first to commoditize and/or move to the cloud
© PAC
Growth opportunities – software
Cloudify everything
• But keep the ability to be privately hosted and on premises
• Data residency and visibility matter in a post-PRISM world
• Analytics is your next weapon – villains are already using it
Become the cyber security platform partner
• With a large, integrable offer
• With a broad range of partners
• IT security remains a best-of-breed market – be the best
Ease of use at the end-point, and in the
operations centre
• Skills are rare and expensive
• Skills are even rarer at the end point
2014Show me the Money! - The Market Opportunity in Cyber Security14
© PAC
Growth challenges – software
2014Show me the Money! - The Market Opportunity in Cyber Security15
Partnerships & alliances are key to growth
• As services grow you need partners for pull-through
• Watch for a shift in balance from direct to indirect sales
Integrate or evaporate
• The software trend is towards simplify and integrate
• … which is the same thing!
• Niche players will become increasingly squeezed
Technology areas to invest in are:
•  Vulnerability management: the first step in cyber security
•  Behavioural analytics: IA for cyber security
•  Encryption and obfuscation of data
•  Biometric integration into IAM
•  Security by design – integration with ADEs and ISVs
© PAC
Things that are NOT differentiators:
2014Show me the Money! - The Market Opportunity in Cyber Security16
Security capability in your
portfolio
• But the lack of is a negative
differentiator
How many events you
scan each day
• Threat intelligence is a
differentiator (for now)
How many SOCs around
the world
• 24x7x365 availability and
redundancy is mandatory
Things that are differentiators:
Local capacities
• Both for professional and
managed services
Business knowledge
• As security embraces more data
and applications specifics
End to end capacities
• Clients want more holistic
approaches
Differentiators
© PAC
Questions
2014Show me the Money! - The Market Opportunity in Cyber Security17
Duncan Brown
d.brown@pac-online.com
Mathieu Poujol
m.poujol@pac-online.com
Your questions are
welcome!!
© PAC
How can PAC support you?
© PAC
SITSI® Cyber Security market
research
2014Show me the Money! - The Market Opportunity in Cyber Security19
© PAC
Your benefits:
Market growth
Client needs
analysis
PAC’s consulting services for cyber
security
Marketing &
Communication
Competitive
positioning
Account & deal support, M&A
advice and support
Understand clients’ needs and
priorities, by detailed segment
Comparative analysis by market,
segment or deal
Supports your campaigns with
content-based collateral
Competitive edge through
knowledge advantage!
Map your portfolio to clients’
key business issues
Position to win, focus effectively,
secure deals
Awareness creation and
credible presentation of
capabilities!
20 2014Show me the Money! - The Market Opportunity in Cyber Security
© PAC
PAC’s Cyber Security team
2014
Mathieu Poujol!
Principal Consultant
Cyber Security & Infrastructures
PAC Group
Duncan Brown!
Director
PAC UK"
"
Franck Nassah!
Senior Vice President
PAC France"
Dominic Trott!
Senior Analyst

PAC UK

"
"
Eugen Schwab-Chesaru!
Managing Director 

Software & IT Services

Eastern Europe

"
"
"
Biswajit Banerjee!
Senior Analyst
Software & IT Services

APAC

"
Show me the Money! - The Market Opportunity in Cyber Security21
© PAC
PAC France!
Pierre Audoin Consultants
Immeuble Actualis - 2e étage
21 boulevard Haussmann
75009 Paris, France
Tel: +33 (0) 1 56 03 67 24
info-france@pac-online.com
!!
!
From strategy to execution, PAC delivers focused and
objective responses to the growth challenges of
Information and Communication Technology (ICT)
players.
Founded in 1976, PAC is a privately held research &
consulting firm for the software and ICT services
market.
PAC helps ICT vendors to optimize their strategies by
providing quantitative and qualitative market analysis
as well as operational and strategic consulting. We
advise CIOs and financial investors in evaluating ICT
vendors and solutions and support their investment
decisions. Public institutions and organizations also rely
on our key analyses to develop and shape their ICT
policies.
For more information, please visit: www.pac-online.com
PAC’s latest news: http://blog.pac-online.com"
"
PAC Germany

Pierre Audoin Consultants
Holzstrasse 26
80469 Munich, Germany
Tel: +49(0) 89 23 23 68 0
Fax: +49(0) 89 719 62 65
info-germany@pac-online.com
!
PAC Romania

Pierre Audoin Consultants
Negustori 12
023953 Bucharest-2 - Romania
Tel.: +40 (0) 21 410 75 80
Fax: +40 (0) 21 410 75 81
info-romania@pac-online.com
!
PAC U.S.

Pierre Audoin Consultants
192 Lexington Avenue - Suite 1101
New York, NY 10016, USA
Tel: +1 646 277-7250
Fax: +1 646 607-1716
info-us@pac-online.com !!
!
PAC UK

Pierre Audoin Consultants
2nd Floor, 15 Bowling Green Lane
London EC1R 0BD
United Kingdom
Tel.: +44 (0) 207 251 2810
Fax: +44 (0) 207 490 7335
info-uk@pac-online.com !!
!
PAC Brazil

Pierre Audoin Consultants
Rua Pedro de Toledo, 130,
Office 61, Vila Clementino
Sao Paulo 04039-030 Brazil
Tel.: +55 (11) 5539 0280
Fax: +55 (11) 5539 0280
info-latam@pac-online.com
About us!
PAC India

Pierre Audoin Consultants
610-611, Ashoka Estate,
24 Barakhamba road,
New Delhi - 110001, India
Tel: +91 (0) 11 4353 4818
info-apac@pac-online.com
2014

Contenu connexe

Tendances

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecuritySounil Yu
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecuritySounil Yu
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security ArchitecturePriyanka Aash
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 

Tendances (20)

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 

En vedette

BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCWill O'Brien
 
PAC Webinar - The French IT market is changing. Are You?
PAC Webinar - The French IT market is changing. Are You?PAC Webinar - The French IT market is changing. Are You?
PAC Webinar - The French IT market is changing. Are You?Nicolas Beyer
 
PAC Webinar - CloudIndex Déc13
PAC Webinar - CloudIndex Déc13PAC Webinar - CloudIndex Déc13
PAC Webinar - CloudIndex Déc13Nicolas Beyer
 
Managing the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance RequiresManaging the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance RequiresWNS Global Services
 
Grad's ! What’s next ?
Grad's ! What’s next ?Grad's ! What’s next ?
Grad's ! What’s next ?Nimish Joseph
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...
Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...
Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...This account is closed
 
Oracle OpenWorld 2014 GRC events and sessions
Oracle OpenWorld 2014 GRC events and sessionsOracle OpenWorld 2014 GRC events and sessions
Oracle OpenWorld 2014 GRC events and sessionsOracle
 
Commercialising your New Idea workshop
Commercialising your New Idea workshopCommercialising your New Idea workshop
Commercialising your New Idea workshopBusinessVictoria
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixFixNix Inc.,
 
Aras PLM Requirements Management
Aras PLM Requirements ManagementAras PLM Requirements Management
Aras PLM Requirements ManagementAras
 
Ten Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCTen Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCBill Graham CP.APMP
 

En vedette (16)

BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
PAC Webinar - The French IT market is changing. Are You?
PAC Webinar - The French IT market is changing. Are You?PAC Webinar - The French IT market is changing. Are You?
PAC Webinar - The French IT market is changing. Are You?
 
PAC Webinar - CloudIndex Déc13
PAC Webinar - CloudIndex Déc13PAC Webinar - CloudIndex Déc13
PAC Webinar - CloudIndex Déc13
 
Managing the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance RequiresManaging the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance Requires
 
Grad's ! What’s next ?
Grad's ! What’s next ?Grad's ! What’s next ?
Grad's ! What’s next ?
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
 
Vc us v4.0
Vc us v4.0Vc us v4.0
Vc us v4.0
 
Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...
Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...
Canadian Compliance Essentials: What U.S. companies coming to Canada need to ...
 
5
 5 5
5
 
Oracle OpenWorld 2014 GRC events and sessions
Oracle OpenWorld 2014 GRC events and sessionsOracle OpenWorld 2014 GRC events and sessions
Oracle OpenWorld 2014 GRC events and sessions
 
Commercialising your New Idea workshop
Commercialising your New Idea workshopCommercialising your New Idea workshop
Commercialising your New Idea workshop
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
Aras PLM Requirements Management
Aras PLM Requirements ManagementAras PLM Requirements Management
Aras PLM Requirements Management
 
Ten Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCTen Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRC
 

Similaire à PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber security

The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...OW2
 
PAC Webinar - Digital disruption in the IT industry: with or without you?!
PAC Webinar - Digital disruption in the IT industry: with or without you?! PAC Webinar - Digital disruption in the IT industry: with or without you?!
PAC Webinar - Digital disruption in the IT industry: with or without you?! Nicolas Beyer
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020Neil Dave
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimiLtd
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 LondonNOAH Advisors
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteMobiloitte
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024DheerajPawar4
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 

Similaire à PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber security (20)

The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
 
PAC Webinar - Digital disruption in the IT industry: with or without you?!
PAC Webinar - Digital disruption in the IT industry: with or without you?! PAC Webinar - Digital disruption in the IT industry: with or without you?!
PAC Webinar - Digital disruption in the IT industry: with or without you?!
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - Mobiloitte
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024
 
IT solution
IT solutionIT solution
IT solution
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 

Dernier

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 

Dernier (20)

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 

PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber security

  • 1. © PAC Show me the money! Evaluating Market Opportunities in Cyber Security 2014 PAC Webinar
  • 2. © PAC 2014Show me the Money! - The Market Opportunity in Cyber Security Your questions are welcome!! Duncan Brown Director, Cyber Security PAC UK Mathieu Poujol Principal Consultant Cyber Security & Infrastructures PAC Group Today’s Presenters 2
  • 3. © PAC Scope definitions PAC definition: Cyber security is defined as technology, services and policies that protect public sector and commercial organizations from the risk of electronic attacks in order to minimize business disruption. Cyber security is mostly an infrastructure- and middleware-based market, but it impacts all ICT systems, from network to business applications. 2014Show me the Money! - The Market Opportunity in Cyber Security3
  • 4. © PAC Cyber security market segments 2014Show me the Money! - The Market Opportunity in Cyber Security4 Cyber security segments The is no digital economy without digital trust
  • 5. © PAC Market size 2014Show me the Money! - The Market Opportunity in Cyber Security5 Total Security IT Services and Software Market Size 2013 and Growth Trends 2013-2017 1.7bn 1.7bn 1.4bn +8.4% +8.5% +6.5% +7.0% Some Territories by Market Size Some Territories by Growth All figures in Euros 31.5bn 12.1bn 8.8% Worldwide Market Size Worldwide Market Growth
  • 6. © PAC Main trends ●  The advent of the digital economy around cloud and mobility has boosted a softer, more open IT security perimeter. ●  The need of a holistic and converged approach across all IT area. ●  The core, the critical part of the IT systems, needs to be hardened: ü The coconut has to give way to the mango. ●  Security needs to focus more strongly on the data and business side than on IT infrastructures, as was the case before. ●  Infrastructure security remains mandatory. ●  Global security governance to master complexity ●  The market is maturing fast, from a specialist-driven approach to a more generalist approach. ●  Government actions and investment are critical in this market. 20146 Show me the Money! - The Market Opportunity in Cyber Security
  • 7. © PAC boosters The economy & discretionary spend Skill shortages New technologies & deperimeterisation Regulation & compliance Increasing threat landscape !" 2014Show me the Money! - The Market Opportunity in Cyber Security7 $ £ ¥ € ¢ Fragmented legislation Market dampers
  • 8. © PAC 2014 Market players Local specialistsIT services generalists Defence contractors Technology vendorsConsultancies Telecoms specialists8
  • 9. © PAC Is security too hard for CISOs? ● Manage the increasing complexity of business and IT systems ● Complexity of the threat landscape, too many solutions, more attacks that are more complex etc. ● Lack of resources constraining budget and efficiency ● Increasing pressure from businesses, regulators and governments 2014Show me the Money! - The Market Opportunity in Cyber Security9
  • 10. © PAC 2014 Market implications Rate of adoption Show me the Money! - The Market Opportunity in Cyber Security Integrated security solutions Managed services 20182013 2014 2015 2016 2017 Data-led governance 2014Show me the Money! - The Market Opportunity in Cyber Security © PAC10
  • 11. © PAC Security services market structure 2014Show me the Money! - The Market Opportunity in Cyber Security11 Managed security services Discrete C&SI security projects Advisory services (GRC, technology trends, etc.) Cloud-based security services (Syaas) Embedded C&SI security input
  • 12. © PAC Growth opportunities – services Position cyber security at the heart of your offerings •  It’s not a nice-to-have •  It’s an enabler for SMAC, DT, and compliance •  Top-down approach: from risk to vulnerabilities to tools Offer an integrated suite of products that provide a comprehensive view of security posture •  Multiple software vendor partnerships are inevitable – today •  You’ll probably have to do the integration yourself •  Security is part of a bigger picture that contains business continuity and risk management Cyber security is not an isolated silo •  Asset and system management •  From business to infrastructure 2014Show me the Money! - The Market Opportunity in Cyber Security12
  • 13. © PAC Growth challenges – services 2014Show me the Money! - The Market Opportunity in Cyber Security13 Achieve scale quickly – eat or be eaten • M&A is firmly on the agenda • Numerous cyber security boutiques exist, with a footprint in local markets Liaise with governments • Cyber security market depends on local regulations, certifications, etc. The battle is in the professional services, SI and consulting space • Consulting and event/threat intelligence are must-haves • MSS will be first to commoditize and/or move to the cloud
  • 14. © PAC Growth opportunities – software Cloudify everything • But keep the ability to be privately hosted and on premises • Data residency and visibility matter in a post-PRISM world • Analytics is your next weapon – villains are already using it Become the cyber security platform partner • With a large, integrable offer • With a broad range of partners • IT security remains a best-of-breed market – be the best Ease of use at the end-point, and in the operations centre • Skills are rare and expensive • Skills are even rarer at the end point 2014Show me the Money! - The Market Opportunity in Cyber Security14
  • 15. © PAC Growth challenges – software 2014Show me the Money! - The Market Opportunity in Cyber Security15 Partnerships & alliances are key to growth • As services grow you need partners for pull-through • Watch for a shift in balance from direct to indirect sales Integrate or evaporate • The software trend is towards simplify and integrate • … which is the same thing! • Niche players will become increasingly squeezed Technology areas to invest in are: •  Vulnerability management: the first step in cyber security •  Behavioural analytics: IA for cyber security •  Encryption and obfuscation of data •  Biometric integration into IAM •  Security by design – integration with ADEs and ISVs
  • 16. © PAC Things that are NOT differentiators: 2014Show me the Money! - The Market Opportunity in Cyber Security16 Security capability in your portfolio • But the lack of is a negative differentiator How many events you scan each day • Threat intelligence is a differentiator (for now) How many SOCs around the world • 24x7x365 availability and redundancy is mandatory Things that are differentiators: Local capacities • Both for professional and managed services Business knowledge • As security embraces more data and applications specifics End to end capacities • Clients want more holistic approaches Differentiators
  • 17. © PAC Questions 2014Show me the Money! - The Market Opportunity in Cyber Security17 Duncan Brown d.brown@pac-online.com Mathieu Poujol m.poujol@pac-online.com Your questions are welcome!!
  • 18. © PAC How can PAC support you?
  • 19. © PAC SITSI® Cyber Security market research 2014Show me the Money! - The Market Opportunity in Cyber Security19
  • 20. © PAC Your benefits: Market growth Client needs analysis PAC’s consulting services for cyber security Marketing & Communication Competitive positioning Account & deal support, M&A advice and support Understand clients’ needs and priorities, by detailed segment Comparative analysis by market, segment or deal Supports your campaigns with content-based collateral Competitive edge through knowledge advantage! Map your portfolio to clients’ key business issues Position to win, focus effectively, secure deals Awareness creation and credible presentation of capabilities! 20 2014Show me the Money! - The Market Opportunity in Cyber Security
  • 21. © PAC PAC’s Cyber Security team 2014 Mathieu Poujol! Principal Consultant Cyber Security & Infrastructures PAC Group Duncan Brown! Director PAC UK" " Franck Nassah! Senior Vice President PAC France" Dominic Trott! Senior Analyst
 PAC UK
 " " Eugen Schwab-Chesaru! Managing Director 
 Software & IT Services
 Eastern Europe
 " " " Biswajit Banerjee! Senior Analyst Software & IT Services
 APAC
 " Show me the Money! - The Market Opportunity in Cyber Security21
  • 22. © PAC PAC France! Pierre Audoin Consultants Immeuble Actualis - 2e étage 21 boulevard Haussmann 75009 Paris, France Tel: +33 (0) 1 56 03 67 24 info-france@pac-online.com !! ! From strategy to execution, PAC delivers focused and objective responses to the growth challenges of Information and Communication Technology (ICT) players. Founded in 1976, PAC is a privately held research & consulting firm for the software and ICT services market. PAC helps ICT vendors to optimize their strategies by providing quantitative and qualitative market analysis as well as operational and strategic consulting. We advise CIOs and financial investors in evaluating ICT vendors and solutions and support their investment decisions. Public institutions and organizations also rely on our key analyses to develop and shape their ICT policies. For more information, please visit: www.pac-online.com PAC’s latest news: http://blog.pac-online.com" " PAC Germany
 Pierre Audoin Consultants Holzstrasse 26 80469 Munich, Germany Tel: +49(0) 89 23 23 68 0 Fax: +49(0) 89 719 62 65 info-germany@pac-online.com ! PAC Romania
 Pierre Audoin Consultants Negustori 12 023953 Bucharest-2 - Romania Tel.: +40 (0) 21 410 75 80 Fax: +40 (0) 21 410 75 81 info-romania@pac-online.com ! PAC U.S.
 Pierre Audoin Consultants 192 Lexington Avenue - Suite 1101 New York, NY 10016, USA Tel: +1 646 277-7250 Fax: +1 646 607-1716 info-us@pac-online.com !! ! PAC UK
 Pierre Audoin Consultants 2nd Floor, 15 Bowling Green Lane London EC1R 0BD United Kingdom Tel.: +44 (0) 207 251 2810 Fax: +44 (0) 207 490 7335 info-uk@pac-online.com !! ! PAC Brazil
 Pierre Audoin Consultants Rua Pedro de Toledo, 130, Office 61, Vila Clementino Sao Paulo 04039-030 Brazil Tel.: +55 (11) 5539 0280 Fax: +55 (11) 5539 0280 info-latam@pac-online.com About us! PAC India
 Pierre Audoin Consultants 610-611, Ashoka Estate, 24 Barakhamba road, New Delhi - 110001, India Tel: +91 (0) 11 4353 4818 info-apac@pac-online.com 2014