SlideShare a Scribd company logo
1 of 11
Download to read offline
1
Source: Draup
1
Report on Cybersecurity: Workload and
Hiring Analysis
An Analysis by Draup
19th May 2023
The document aims to providethe IndustryOverview, Industry Ecosystem,
Processes, Skills and Competencies, Cybersecurity Footprint, Outsourcing
overview, and Key Industries Snapshotfor Cybersecurity Analysis.
CLICK HERE
Toaccess the full report
2
Use Case Cluster Solution
Telecommunications
Enterprise
Software
Insurance
Hospital &
Healthcare
Professional
Services
Banking &
Financial Services
Consumer Electronics Aerospace Industrial
CyberThreatAnalytics
CyberThreat
DetectionusingAI
CyberThreat
Analytics
Cybersecurityfor
Connected
Medical Devices
CyberThreat
Analytics
Cybersecurityfor
Data Privacy&
Protection
Cybersecurityfor
ConsumerElectronics
Devices
Cybersecurityfor
Industrial
Automation&
Control Systems
CyberThreat
Analytics
CyberThreatDetection
usingAI
CyberThreat
Analytics
Cybersecurity
for Data
Privacy&
Protection
CyberThreat
Analytics
Cybersecurity
for Data
Privacy&
Protection
CyberThreat
DetectionusingAI
CyberSecurity
Modernization
CyberThreat
Analytics
Cybersecurityfor
Industrial
Automation&
Control Systems
Cybersecurityfor
Industrial Automation&
Control Systems
Cybersecurityfor
Data Privacy&
Protection
CyberSecurity
Modernization
CyberThreat
DetectionusingAI
CyberThreat
Detection
usingAI
CyberThreat
Analytics
CyberThreatDetection
usingAI
CyberThreat
DetectionusingAI
CyberThreat
Prediction
CyberSecurity
Modernization
Cybersecurityfor
Industrial
Automation&
Control Systems
CyberThreat
Detectionusing
AI
CyberSecurity
Modernization
CyberAssist
App
CyberSecurity
Modernization
CyberThreatAnalytics
CyberThreat
Prediction
CyberThreat
DetectionusingAI
CyberThreatPrediction CyberAssistApp
CyberThreat
Prediction
CyberThreat
Prediction
CyberThreat
Prediction
CybersecurityforData
Privacy& Protection
Cybersecurity
for Gaming
CybersecurityforPower
PlantAutomation&
Control Systems
Cybersecurity for
ConnectedMedical
Devices
CyberThreatPrediction
Cybersecurity-related Usecases across Industries(1/3): Telecommunication, Enterprise Software, Insurance, and
Hospital & Healthcare are the key industry in cybersecurity services
Source: Draup Analysis, DraupBusinessIntentions.
Note: Digital Use Cases capturedare not exhaustive
Low Medium High
Intensity
3
Source: Newsroom AndPress Release of HCL,Fortinet, Charter Communications, SecurityBridge, and PaloAlto
Ciscoto provide aunified, AI-driven,cross-
domain securityplatform, calledCisco’snew
XDR solutionwithadvancedfeaturesforDuo
MFA to helporganizationsbetterprotectthe
integrityof theirentireITecosystem.
SpectrumEnterprise,apartof Charter
Communications,Inc.,partneredwithCiscoto
provide Secure Access with CiscoDuo and Cloud
Security with Cisco+ Secure Connectto itsportfolio
of cybersecurityproducts for secure accessto
informationonprivate networksorpublicclouds.
HCL TechnologiespartneredwithMicrosoftto
combine HCL's cybersecurityfusionplatform with
Microsoft’ssecurity products,like Azure Sentinel
and Microsoft365 E5, coveringidentityandaccess,
informationprotection,andhybridcloud
infrastructure securityforenterprises.
DigiCertpartneredwithOracle toprovide
DigiCertONE,the platformfordigital trust.
Oracle CloudInfrastructure (OCI) provides
customerswithapowerful combinationof
solutions tosafeguardtheirdata and secure
theirassets.
SecurityBridgepartneredwithFortiGate to
integrate the FortiGate solutionforSAP,
enablingan unprecedented,advancedlevel of
securityinsight, speed,andprotection.
AI-Driven
XDR
Solution
End-to-End
Solution
Cybersecurity
Fusion
Platform
Data
Security
Solution
Advanced
Security
Intelligent
Cybersecurity
AllianzpartneredwithCoalitiontoexpanditscyber
businessforSME and mid-sizedcompaniesinkey
markets.Proactivelymonitoringandresolvingcyber
riskssubstantiallyhelpscustomersprotecttheir
businessesandpreventsfinancial losses.
Cybersecurity
for
SME
Health
Insurance
Cybersecurity
Cyber-Risk
Transfer
MunichRe partnerswithGoogle CloudandAllianz
to bring market-leadingcyberrisk-transfer
expertise withGoogle Cloud’ssecurityknow-howto
addressspecificclientneeds.
CignapartneredwithShiftTechnologytoevaluate
Shift’sfrauddetectionsolutionForce tosupportits
InternationalOperationsUnit,whichmanages
international grouphealthinsurance,tostrengthenits
fraud detectioncapabilitieswithinthe claims process.
NTT Ltd partneredwithPaloAltotobringtogether
NTT Ltd.’s‘Secure byDesign’serviceswithPaloAlto
NetworksPrisma™AccessandCortex™XSOAR
technologiesandfocusonthe intelligent
workplace,intelligentinfrastructure,and
intelligentcybersecurity.
Partnership Inhouse
Telecommunications Enterprise Software Insurance
Industry Ecosystem (1/9): Telecommunication, Enterprise Software, and Insurance Industries focus on solutions like
Intelligent Cybersecurity, Cybersecurity Fusion Platforms, and Insurance Cybersecurity
4
Application Security: Applications are connected across multiple networks, including the cloud, which leaves them
open to all cloud threats and vulnerabilities, so application security is a tool to prevent cyberattacks
Summary
• Application security secures an application
throughout its life cycle by three states that are
building secure applications on secure
workloads, securing applications during runtime,
including access of applications to users &
devices, and maintaining adaptative security on
applications as they change and get updated.
• Runtime Application Self-Protection (RASP)
provides personalized application protections
based on insight into internal data.
• Static Application Security Testing (SAST) is a
security testing method to analyze source code
for vulnerability and Dynamic Application
Security Testing (DAST) provides insight into how
applications behave during production.
• Web application security is the practice of protecting websites, applications, and APIs from
attacks. It aims to keep web applications functioning smoothly and protect businesses from
cyber vandalism, data theft, unethical competition, and other negative consequences.
Web Application
Security
Features
Cloud Native
Application
Security
• Mobile application security focuses on the software security posture of mobile apps on
Android, iOS, and Windows Phone platforms. It involves assessing applications for security
issues in the contexts of the media they are designed to run on, the frameworks they are
developed with, and the anticipated set of users.
Mobile
Application
Security
• Cloud-native application security is a cloud-first approach used to deploy applications
securely at scale by embedding security intothe software development lifecycle todetect
vulnerabilities earlier with methodologies like shift left security strategies, zero-trust
architecture, etc.
Application security is a set of measures designed to prevent data or code at the application level from
being stolen or manipulated. Itinvolves security during application development, design phases, and
systems and approaches thatprotectapplications after deployment.
Types Of
Solutions
Source: Various companies’ websites, Market Reports, Press & Media Releases.
5
Skills and Competencies Overview: Cyber Security Engineer, Cyber Security Analyst, and Information Security Analyst
are the job roles in demand
Source: Draup Outsourcing Module, updatedinMay2023
Job Roles inDemand Core Skills Soft Skills Competencies
CyberSecurityEngineer
• Cybersecurity
• NetworkSecurity
• SecurityEngineering
• CyberDefense
• CrisisManagement
• Problem-Solving
• StrategicThinking
• Methodical
• IntrusionDetection,ProductSecurity,SecurityTesting,
VulnerabilityManagement,ThreatandRiskAssessment,Cyber
ThreatIntelligence (CTI)
• Createdvulnerabilityassessmentreports
CyberSecurityAnalyst
• CyberThreatIntelligence (CTI)
• ThreatModeling
• SecurityDesign
• SecurityOperationsManagement
• SecurityControls
• Critical Thinking
• LearningAgility
• ResearchAptitude
• Innovation
• Analyze securityvulnerabilitiestonotifythe customersof Siemens
Vilocifyaboutsoftware vulnerabilitiesatthe earliest
• In depthanalysisandunderstandingof cyberbreachthroughthe
analysisandcorrelatingof securitylogswiththe utilizationof
SIEMtools
InformationSecurityAnalyst
• Malware Analysis
• SecurityEventandIncident
Management(SEIM)
• InformationSecurity
• SecurityAnalysis
• Managerial Aptitude
• Analytical Thinking
• Logical Reasoning
• StrategicThinking
• Analysisof alertsgeneratedbyFireEyeforEndpoints/Devices&
takingnecessaryactionsforblockingsuchmalware callbacksat
the networklevel
• Malware Analysisof the alertstoidentifythe threatvectorin
orderto recommendeffective securitycontrols
NetworkSecurityEngineer
• NetworkSecurity
• NetworkAccessControl (NAC)
• VulnerabilityAssessment
• IntrusionDetection
• Critical Thinking
• Managerial Aptitude
• Methodical
• Analytical Thinking
• Troubleshootingwiththe NetworkDatateamforroutingissuesof
the traffic
• Responsible forsecuringinfrastructure devicesanddataby using
belowtechnologieslike CiscoASA firewalls,Proxy - Zscaler,
Bluecoat,Nippertool,Antivirus - Symantec, andQualysGuard
InformationSecurityEngineer
• InformationAssurance Vulnerability
• Malware Analysis
• SecurityMonitoring
• VulnerabilityManagement
• Conceptualization
• Logical Reasoning
• Problem-Solving
• Organizing
• Establishingmultiple programswithoutexisting,including
Governance andCompliance,EnterpriseandThird-PartyRisk,
SecurityOperations,andSecurityEngineering
• Developinganddeployingprocessesandtoolingtofacilitate third-
party riskoperationsandsendingoutboundquestionnairesand
performingriskassessmentsonBonuslyvendors
6
Globalization Footprint: Americas region dominates the cybersecurity global Technology workforce landscape
Source: Draup Globalization Module, updatedinMay2023
Note: The representeddata illustrates the numberof centers byGeography, and the bubble size is proportional to the overall HCInstalled in the area.
Global Footprint For Cybersecurity
Americas
EMEA
APAC
8203K – 8204K
Total Number of Technologyworkforce Installed
~960
Total Number of TechnologyLocations
3080K - 3090K
339
Key Locations
• Paris Area,France
• London, United Kingdom
• Madrid Area, Spain
• Munich Area, Germany
• Amsterdam Area, Netherlands
• Johannesburg, Gauteng, South
Africa
• Milan Area,Italy
• Stockholm, Sweden
• Stuttgart Area, Germany
Key Locations
• Bengaluru Area, India
• National Capital Region,India
• Pune Area, India
• Chennai Area, India
• Shanghai Area, China
• Hyderabad Area, India
• BeijingArea, China
• Singapore
• Tokyo, Japan
• Sydney, Australia
2473K – 2474K
126
2640K – 2641K
495
Key Locations
• San Francisco Bay Area,United States
• Greater New York City Area, United States
• Washington D.C. Metro Area, United States
• Sao Paulo Area, Brazil
• Greater Seattle Area, United States
• Dallas/FortWorth Area, United States
Greater Boston Area, United States
• Greater Los Angeles Area, United States
• Toronto, Canada Area
• Greater Chicago Area, United States
• Greater Atlanta Area, United States
30%
38%
32%
Technology Headcounts
Number of Technology
Locations
7
Americas Region Cybersecurity Footprint: San Francisco Bay Area, Greater New York City Area, and Washington D.C.
Metro Area, United States, are the major MSA locations across the Americas region
Source: Draup Globalization Module, updatedinMay2023
Note: The representeddata illustratesthe numberofcenters byGeography.
Key Focus Areas
Associated Players
Top MSA Locations across AmericaRegion
Total Headcount: ~3089K
Other ER&D MSA Locations
Key Hotspots (Top 15 MSA Locations)
Note: Key Hotspots arecurated basedon theheadcountintensity
Total Number ofLocations: ~339
GreaterLos Angeles Area, United States
San Francisco Bay Area, United States
GreaterNewYork City Area,United States
GreaterChicago Area, United States
• The shift to virtualized IT environments, such as the
infrastructure, data, and cloud computing network, led
to many organizations facing cyberattacks due to the
security vulnerability of remote work. North America is
the dominant region in this market. Cloud Security is
the fastest-developing market subsegment.
• Key providers install advanced IT security solutions to
protect sensitive information related to manufacturing
operations while increasing productivity.
GreaterBoston Area,UnitedStates
GreaterDetroitArea, UnitedStates
Sao PauloArea, Brazil
Dallas/Fort Worth Area,UnitedStates
GreaterPhiladelphia Area, United States
Toronto, Canada Area
GreaterSeattle Area, United States
WashingtonD.C.Metro Area,United States
GreaterAtlanta Area, UnitedStates
Houston, Texas Area, United States
GreaterMinneapolis-St. PaulArea,UnitedStates
8
Key Location Highlights: San Francisco Bay Area, United States, dominates Cybersecurity in Americas region
Source: Draup Globalization Module
Note: The Locations mentionedabove are the keylocations forsmart home appliancesinthe Americas region;SOAR-SecurityOrchestration, Automation, and Response;SIEM- SecurityInformationandEvent Management
Locations Headcount Key Companies Functional Workload Description
San Francisco Bay Area,
United States
259K - 260K
• Cybersecurity
• Artificial Intelligence & Data
Science
• Game Design & Development
• Protect enterprise customers from cyber attacks, transforming their
security operations with Chronicle SIEM / SOAR, BeyondCorp, Security
Command Center, Security Foundation, and Mandiant
Greater New York City
Area, United States
245K - 246K
• Cybersecurity
• Cloud Computing
• UI/UX Design
• Implement frameworks for Operational Risk Appetite and Key Risk
Indicators (KRIs), yielding a structured approach to the management,
measurement, monitoring, governance, and control of technology and
cybersecurity risks
Washington D.C. Metro
Area, United States
178K - 179K
• Cybersecurity
• Aerospace Testing &
Simulation
• Data Engineering
• Leading the Client Cyber Tabletop Exercise team, delivering tabletop
exercise scenarios to clients of the firm
• Define and enforce cyber security policies and standards across the
organization in support of operations and compliance
Sao Paulo Area, Brazil 145K - 146K
• Cybersecurity
• Software Testing
• Application Development &
Maintenance
• Implementation of effective risk management programs, execution
and monitoring of technology risk and control processes as required
• Support the documentation process of information risk control
issues/gaps and the remediation plans, investigating and resolving
control incidents
Greater Seattle Area,
United States
125K – 126K
• Cybersecurity
• Mobile Application
Development
• Manufacturing Engineering
• Streamline and strengthen their security program across
multiplatform, multi-cloud environments
• Envisioning CISOs in the secure journey to the cloud and prioritizing
quick wins in the fight against cyberadversaries, risks, and threats
9
Vendor Engagement: TCS, HCL, Wipro, Cognizant, and Infosys are the leading Cybersecurity services providers in
Cybersecurity Outsourcing Market
Source: Draup Outsourcing Module, updatedinMay2023
Total Outsourcing Headcount
57K – 58K
No. of Service ProvidersAnalyzed
~789
No. of ClientsAnalyzed
~1375
Provider Locations
Client Locations
Key Client Locations
• Bengaluru Area, India
• Mumbai Area, India
• National Capital Region,
India
• Pune Area, India
• Hyderabad Area, India
• Chennai Area, India
• San Francisco Bay Area,
United States
• Greater New York City Area,
United States
Key Provider Locations
• Bengaluru Area, India
• Hyderabad Area, India
• National Capital Region,
India
• Chennai Area, India
• Pune Area, India
• Mumbai Area, India
• Kolkata Area, India
• Paris Area, France
• Madrid Area, Spain
• Sao Paulo Area, Brazil
Split by Industries
Key OEM’s KeyServiceProviders
25%
3%
4%
4%
4%
4%
5%
5%
10%
12%
22%
Others
ConsumerSoftware
Food, Beverages &ConsumerGoods
Pharmaceutical
Retail
Energy & Utilities
Insurance
Automotive
Enterprise Software
Telecommunications
Banking & Financial Services
10
Industries Snapshot(1/5): Banking & Financial Services
Source: Draup Outsourcing Module, updatedinMay2023
Top Service
Providers
Top Client MSA Top Provider MSA Key Workloads
• Bengaluru Area,
India
• Mumbai Area, India
• Bengaluru Area, India
• Mumbai Area, India
• Analysisof business requirements and
implementingrules inAbinitioandAWS
• Workingwith Designdiagrams using
Microsoft Visio
• Chennai Area, India
• Pune Area, India
• Bengaluru Area, India
• HyderabadArea,
India
• Monitorizationof P1, P2 andIncident
tickets through Service Now
• Analysisof Openandmanaged
incidents using Service Now
• Bengaluru Area,
India
• Pune Area, India
• Bengaluru Area, India
• Chennai Area, India
• CBA risk management teaminthe
investigationof data breachincidents
• Performance of change management
for DLPservices
• Singapore
• Pune Area, India
• HyderabadArea,
India
• Pune Area, India
• Along withSSP, SEAS, and ICC
applications in all environments
• Migrationof all partners (Internal,
External, VPN partners) fromGIS
• Mumbai Area, India
• Greater Boston
Area, United States
• Bengaluru Area, India
• National Capital
Region, India
• Administrationandconfigurationof
Web sphere ApplicationServerWAS
V8.5.5 and WAS V9.0 on Linux OS
• Configuration offirewall rulesand
troubleshootingthe issues
Top ServiceProvidersEngagement Snapshot
Top Clients Top Client MSA Top Provider MSA Key Workloads
• Chennai Area, India
• Singapore
• HyderabadArea,
India
• Chennai Area, India
• Able to handle all admin tasks onSIEM
products
• Reporting andtroubleshootingof log
sources not reporting to SIEM
• HyderabadArea,
India
• Pune Area, India
• Pune Area, India
• HyderabadArea,
India
• Implementationof customer risk
rating criteria withKYCmanagement
and procedure for bothconsumer and
corporate customer
• Pune Area, India
• Mumbai Area,
India
• Bengaluru Area,
India
• Pune Area, India
• Analysisof cybersecuritytech lead
and handlinga team whichis
responsible forsupporting the access
management of SAPsystems
• Mumbai Area,
India
• Mumbai Area, India
• HyderabadArea,
India
• Workingwith vendors to get Security
Infrastructure to work smoothly
• Loan eligibilityDetailswill be provided
byAPIs
• Mumbai Area,
India
• Mumbai Area, India
• National Capital
Region, India
• ImplementationandConfigurationof
Cisco 800/1900 SeriesRouters and
routing protocols
• Configuration ofrouters and switches
forbackup
Top ClientsEngagement Snapshot
Key ServiceProviders Key Clients
Total Number of Clients Analyzed
~240
Total Number of Service ProviderAnalyzed
~265
Workforce analyzed
~13K-14K
11
www.draup.com
HOUSTON I BANGALORE
© 2023 DRAUP. All Rights Reserved.
info@draup.com

More Related Content

Similar to Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Trends.pdf

Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by DesignDMI
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 

Similar to Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Trends.pdf (20)

Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 

More from Draup3

The Blueprint for Progressive Employee Benefits.pdf
The Blueprint for Progressive Employee Benefits.pdfThe Blueprint for Progressive Employee Benefits.pdf
The Blueprint for Progressive Employee Benefits.pdfDraup3
 
Key IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdfKey IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdfDraup3
 
Crafting Employee Benefits for Success in 2023.pdf
Crafting Employee Benefits for Success in 2023.pdfCrafting Employee Benefits for Success in 2023.pdf
Crafting Employee Benefits for Success in 2023.pdfDraup3
 
A Comprehensive Study of LATAM’s Emerging Tech Hub.pdf
A Comprehensive Study of LATAM’s Emerging Tech Hub.pdfA Comprehensive Study of LATAM’s Emerging Tech Hub.pdf
A Comprehensive Study of LATAM’s Emerging Tech Hub.pdfDraup3
 
Building Cost-Effective Cloud Teams in 2023
Building Cost-Effective Cloud Teams in 2023Building Cost-Effective Cloud Teams in 2023
Building Cost-Effective Cloud Teams in 2023Draup3
 
Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...
Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...
Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...Draup3
 
Agile L&D Transformation - A Game-Changer for Pharma.pdf
Agile L&D Transformation - A Game-Changer for Pharma.pdfAgile L&D Transformation - A Game-Changer for Pharma.pdf
Agile L&D Transformation - A Game-Changer for Pharma.pdfDraup3
 
Emergence of 5G: Understanding the Talent Outlook
Emergence of 5G: Understanding the Talent OutlookEmergence of 5G: Understanding the Talent Outlook
Emergence of 5G: Understanding the Talent OutlookDraup3
 

More from Draup3 (8)

The Blueprint for Progressive Employee Benefits.pdf
The Blueprint for Progressive Employee Benefits.pdfThe Blueprint for Progressive Employee Benefits.pdf
The Blueprint for Progressive Employee Benefits.pdf
 
Key IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdfKey IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdf
 
Crafting Employee Benefits for Success in 2023.pdf
Crafting Employee Benefits for Success in 2023.pdfCrafting Employee Benefits for Success in 2023.pdf
Crafting Employee Benefits for Success in 2023.pdf
 
A Comprehensive Study of LATAM’s Emerging Tech Hub.pdf
A Comprehensive Study of LATAM’s Emerging Tech Hub.pdfA Comprehensive Study of LATAM’s Emerging Tech Hub.pdf
A Comprehensive Study of LATAM’s Emerging Tech Hub.pdf
 
Building Cost-Effective Cloud Teams in 2023
Building Cost-Effective Cloud Teams in 2023Building Cost-Effective Cloud Teams in 2023
Building Cost-Effective Cloud Teams in 2023
 
Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...
Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...
Navigating the Talent Crunch - Effective Reskilling Strategies for Software E...
 
Agile L&D Transformation - A Game-Changer for Pharma.pdf
Agile L&D Transformation - A Game-Changer for Pharma.pdfAgile L&D Transformation - A Game-Changer for Pharma.pdf
Agile L&D Transformation - A Game-Changer for Pharma.pdf
 
Emergence of 5G: Understanding the Talent Outlook
Emergence of 5G: Understanding the Talent OutlookEmergence of 5G: Understanding the Talent Outlook
Emergence of 5G: Understanding the Talent Outlook
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Trends.pdf

  • 1. 1 Source: Draup 1 Report on Cybersecurity: Workload and Hiring Analysis An Analysis by Draup 19th May 2023 The document aims to providethe IndustryOverview, Industry Ecosystem, Processes, Skills and Competencies, Cybersecurity Footprint, Outsourcing overview, and Key Industries Snapshotfor Cybersecurity Analysis. CLICK HERE Toaccess the full report
  • 2. 2 Use Case Cluster Solution Telecommunications Enterprise Software Insurance Hospital & Healthcare Professional Services Banking & Financial Services Consumer Electronics Aerospace Industrial CyberThreatAnalytics CyberThreat DetectionusingAI CyberThreat Analytics Cybersecurityfor Connected Medical Devices CyberThreat Analytics Cybersecurityfor Data Privacy& Protection Cybersecurityfor ConsumerElectronics Devices Cybersecurityfor Industrial Automation& Control Systems CyberThreat Analytics CyberThreatDetection usingAI CyberThreat Analytics Cybersecurity for Data Privacy& Protection CyberThreat Analytics Cybersecurity for Data Privacy& Protection CyberThreat DetectionusingAI CyberSecurity Modernization CyberThreat Analytics Cybersecurityfor Industrial Automation& Control Systems Cybersecurityfor Industrial Automation& Control Systems Cybersecurityfor Data Privacy& Protection CyberSecurity Modernization CyberThreat DetectionusingAI CyberThreat Detection usingAI CyberThreat Analytics CyberThreatDetection usingAI CyberThreat DetectionusingAI CyberThreat Prediction CyberSecurity Modernization Cybersecurityfor Industrial Automation& Control Systems CyberThreat Detectionusing AI CyberSecurity Modernization CyberAssist App CyberSecurity Modernization CyberThreatAnalytics CyberThreat Prediction CyberThreat DetectionusingAI CyberThreatPrediction CyberAssistApp CyberThreat Prediction CyberThreat Prediction CyberThreat Prediction CybersecurityforData Privacy& Protection Cybersecurity for Gaming CybersecurityforPower PlantAutomation& Control Systems Cybersecurity for ConnectedMedical Devices CyberThreatPrediction Cybersecurity-related Usecases across Industries(1/3): Telecommunication, Enterprise Software, Insurance, and Hospital & Healthcare are the key industry in cybersecurity services Source: Draup Analysis, DraupBusinessIntentions. Note: Digital Use Cases capturedare not exhaustive Low Medium High Intensity
  • 3. 3 Source: Newsroom AndPress Release of HCL,Fortinet, Charter Communications, SecurityBridge, and PaloAlto Ciscoto provide aunified, AI-driven,cross- domain securityplatform, calledCisco’snew XDR solutionwithadvancedfeaturesforDuo MFA to helporganizationsbetterprotectthe integrityof theirentireITecosystem. SpectrumEnterprise,apartof Charter Communications,Inc.,partneredwithCiscoto provide Secure Access with CiscoDuo and Cloud Security with Cisco+ Secure Connectto itsportfolio of cybersecurityproducts for secure accessto informationonprivate networksorpublicclouds. HCL TechnologiespartneredwithMicrosoftto combine HCL's cybersecurityfusionplatform with Microsoft’ssecurity products,like Azure Sentinel and Microsoft365 E5, coveringidentityandaccess, informationprotection,andhybridcloud infrastructure securityforenterprises. DigiCertpartneredwithOracle toprovide DigiCertONE,the platformfordigital trust. Oracle CloudInfrastructure (OCI) provides customerswithapowerful combinationof solutions tosafeguardtheirdata and secure theirassets. SecurityBridgepartneredwithFortiGate to integrate the FortiGate solutionforSAP, enablingan unprecedented,advancedlevel of securityinsight, speed,andprotection. AI-Driven XDR Solution End-to-End Solution Cybersecurity Fusion Platform Data Security Solution Advanced Security Intelligent Cybersecurity AllianzpartneredwithCoalitiontoexpanditscyber businessforSME and mid-sizedcompaniesinkey markets.Proactivelymonitoringandresolvingcyber riskssubstantiallyhelpscustomersprotecttheir businessesandpreventsfinancial losses. Cybersecurity for SME Health Insurance Cybersecurity Cyber-Risk Transfer MunichRe partnerswithGoogle CloudandAllianz to bring market-leadingcyberrisk-transfer expertise withGoogle Cloud’ssecurityknow-howto addressspecificclientneeds. CignapartneredwithShiftTechnologytoevaluate Shift’sfrauddetectionsolutionForce tosupportits InternationalOperationsUnit,whichmanages international grouphealthinsurance,tostrengthenits fraud detectioncapabilitieswithinthe claims process. NTT Ltd partneredwithPaloAltotobringtogether NTT Ltd.’s‘Secure byDesign’serviceswithPaloAlto NetworksPrisma™AccessandCortex™XSOAR technologiesandfocusonthe intelligent workplace,intelligentinfrastructure,and intelligentcybersecurity. Partnership Inhouse Telecommunications Enterprise Software Insurance Industry Ecosystem (1/9): Telecommunication, Enterprise Software, and Insurance Industries focus on solutions like Intelligent Cybersecurity, Cybersecurity Fusion Platforms, and Insurance Cybersecurity
  • 4. 4 Application Security: Applications are connected across multiple networks, including the cloud, which leaves them open to all cloud threats and vulnerabilities, so application security is a tool to prevent cyberattacks Summary • Application security secures an application throughout its life cycle by three states that are building secure applications on secure workloads, securing applications during runtime, including access of applications to users & devices, and maintaining adaptative security on applications as they change and get updated. • Runtime Application Self-Protection (RASP) provides personalized application protections based on insight into internal data. • Static Application Security Testing (SAST) is a security testing method to analyze source code for vulnerability and Dynamic Application Security Testing (DAST) provides insight into how applications behave during production. • Web application security is the practice of protecting websites, applications, and APIs from attacks. It aims to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences. Web Application Security Features Cloud Native Application Security • Mobile application security focuses on the software security posture of mobile apps on Android, iOS, and Windows Phone platforms. It involves assessing applications for security issues in the contexts of the media they are designed to run on, the frameworks they are developed with, and the anticipated set of users. Mobile Application Security • Cloud-native application security is a cloud-first approach used to deploy applications securely at scale by embedding security intothe software development lifecycle todetect vulnerabilities earlier with methodologies like shift left security strategies, zero-trust architecture, etc. Application security is a set of measures designed to prevent data or code at the application level from being stolen or manipulated. Itinvolves security during application development, design phases, and systems and approaches thatprotectapplications after deployment. Types Of Solutions Source: Various companies’ websites, Market Reports, Press & Media Releases.
  • 5. 5 Skills and Competencies Overview: Cyber Security Engineer, Cyber Security Analyst, and Information Security Analyst are the job roles in demand Source: Draup Outsourcing Module, updatedinMay2023 Job Roles inDemand Core Skills Soft Skills Competencies CyberSecurityEngineer • Cybersecurity • NetworkSecurity • SecurityEngineering • CyberDefense • CrisisManagement • Problem-Solving • StrategicThinking • Methodical • IntrusionDetection,ProductSecurity,SecurityTesting, VulnerabilityManagement,ThreatandRiskAssessment,Cyber ThreatIntelligence (CTI) • Createdvulnerabilityassessmentreports CyberSecurityAnalyst • CyberThreatIntelligence (CTI) • ThreatModeling • SecurityDesign • SecurityOperationsManagement • SecurityControls • Critical Thinking • LearningAgility • ResearchAptitude • Innovation • Analyze securityvulnerabilitiestonotifythe customersof Siemens Vilocifyaboutsoftware vulnerabilitiesatthe earliest • In depthanalysisandunderstandingof cyberbreachthroughthe analysisandcorrelatingof securitylogswiththe utilizationof SIEMtools InformationSecurityAnalyst • Malware Analysis • SecurityEventandIncident Management(SEIM) • InformationSecurity • SecurityAnalysis • Managerial Aptitude • Analytical Thinking • Logical Reasoning • StrategicThinking • Analysisof alertsgeneratedbyFireEyeforEndpoints/Devices& takingnecessaryactionsforblockingsuchmalware callbacksat the networklevel • Malware Analysisof the alertstoidentifythe threatvectorin orderto recommendeffective securitycontrols NetworkSecurityEngineer • NetworkSecurity • NetworkAccessControl (NAC) • VulnerabilityAssessment • IntrusionDetection • Critical Thinking • Managerial Aptitude • Methodical • Analytical Thinking • Troubleshootingwiththe NetworkDatateamforroutingissuesof the traffic • Responsible forsecuringinfrastructure devicesanddataby using belowtechnologieslike CiscoASA firewalls,Proxy - Zscaler, Bluecoat,Nippertool,Antivirus - Symantec, andQualysGuard InformationSecurityEngineer • InformationAssurance Vulnerability • Malware Analysis • SecurityMonitoring • VulnerabilityManagement • Conceptualization • Logical Reasoning • Problem-Solving • Organizing • Establishingmultiple programswithoutexisting,including Governance andCompliance,EnterpriseandThird-PartyRisk, SecurityOperations,andSecurityEngineering • Developinganddeployingprocessesandtoolingtofacilitate third- party riskoperationsandsendingoutboundquestionnairesand performingriskassessmentsonBonuslyvendors
  • 6. 6 Globalization Footprint: Americas region dominates the cybersecurity global Technology workforce landscape Source: Draup Globalization Module, updatedinMay2023 Note: The representeddata illustrates the numberof centers byGeography, and the bubble size is proportional to the overall HCInstalled in the area. Global Footprint For Cybersecurity Americas EMEA APAC 8203K – 8204K Total Number of Technologyworkforce Installed ~960 Total Number of TechnologyLocations 3080K - 3090K 339 Key Locations • Paris Area,France • London, United Kingdom • Madrid Area, Spain • Munich Area, Germany • Amsterdam Area, Netherlands • Johannesburg, Gauteng, South Africa • Milan Area,Italy • Stockholm, Sweden • Stuttgart Area, Germany Key Locations • Bengaluru Area, India • National Capital Region,India • Pune Area, India • Chennai Area, India • Shanghai Area, China • Hyderabad Area, India • BeijingArea, China • Singapore • Tokyo, Japan • Sydney, Australia 2473K – 2474K 126 2640K – 2641K 495 Key Locations • San Francisco Bay Area,United States • Greater New York City Area, United States • Washington D.C. Metro Area, United States • Sao Paulo Area, Brazil • Greater Seattle Area, United States • Dallas/FortWorth Area, United States Greater Boston Area, United States • Greater Los Angeles Area, United States • Toronto, Canada Area • Greater Chicago Area, United States • Greater Atlanta Area, United States 30% 38% 32% Technology Headcounts Number of Technology Locations
  • 7. 7 Americas Region Cybersecurity Footprint: San Francisco Bay Area, Greater New York City Area, and Washington D.C. Metro Area, United States, are the major MSA locations across the Americas region Source: Draup Globalization Module, updatedinMay2023 Note: The representeddata illustratesthe numberofcenters byGeography. Key Focus Areas Associated Players Top MSA Locations across AmericaRegion Total Headcount: ~3089K Other ER&D MSA Locations Key Hotspots (Top 15 MSA Locations) Note: Key Hotspots arecurated basedon theheadcountintensity Total Number ofLocations: ~339 GreaterLos Angeles Area, United States San Francisco Bay Area, United States GreaterNewYork City Area,United States GreaterChicago Area, United States • The shift to virtualized IT environments, such as the infrastructure, data, and cloud computing network, led to many organizations facing cyberattacks due to the security vulnerability of remote work. North America is the dominant region in this market. Cloud Security is the fastest-developing market subsegment. • Key providers install advanced IT security solutions to protect sensitive information related to manufacturing operations while increasing productivity. GreaterBoston Area,UnitedStates GreaterDetroitArea, UnitedStates Sao PauloArea, Brazil Dallas/Fort Worth Area,UnitedStates GreaterPhiladelphia Area, United States Toronto, Canada Area GreaterSeattle Area, United States WashingtonD.C.Metro Area,United States GreaterAtlanta Area, UnitedStates Houston, Texas Area, United States GreaterMinneapolis-St. PaulArea,UnitedStates
  • 8. 8 Key Location Highlights: San Francisco Bay Area, United States, dominates Cybersecurity in Americas region Source: Draup Globalization Module Note: The Locations mentionedabove are the keylocations forsmart home appliancesinthe Americas region;SOAR-SecurityOrchestration, Automation, and Response;SIEM- SecurityInformationandEvent Management Locations Headcount Key Companies Functional Workload Description San Francisco Bay Area, United States 259K - 260K • Cybersecurity • Artificial Intelligence & Data Science • Game Design & Development • Protect enterprise customers from cyber attacks, transforming their security operations with Chronicle SIEM / SOAR, BeyondCorp, Security Command Center, Security Foundation, and Mandiant Greater New York City Area, United States 245K - 246K • Cybersecurity • Cloud Computing • UI/UX Design • Implement frameworks for Operational Risk Appetite and Key Risk Indicators (KRIs), yielding a structured approach to the management, measurement, monitoring, governance, and control of technology and cybersecurity risks Washington D.C. Metro Area, United States 178K - 179K • Cybersecurity • Aerospace Testing & Simulation • Data Engineering • Leading the Client Cyber Tabletop Exercise team, delivering tabletop exercise scenarios to clients of the firm • Define and enforce cyber security policies and standards across the organization in support of operations and compliance Sao Paulo Area, Brazil 145K - 146K • Cybersecurity • Software Testing • Application Development & Maintenance • Implementation of effective risk management programs, execution and monitoring of technology risk and control processes as required • Support the documentation process of information risk control issues/gaps and the remediation plans, investigating and resolving control incidents Greater Seattle Area, United States 125K – 126K • Cybersecurity • Mobile Application Development • Manufacturing Engineering • Streamline and strengthen their security program across multiplatform, multi-cloud environments • Envisioning CISOs in the secure journey to the cloud and prioritizing quick wins in the fight against cyberadversaries, risks, and threats
  • 9. 9 Vendor Engagement: TCS, HCL, Wipro, Cognizant, and Infosys are the leading Cybersecurity services providers in Cybersecurity Outsourcing Market Source: Draup Outsourcing Module, updatedinMay2023 Total Outsourcing Headcount 57K – 58K No. of Service ProvidersAnalyzed ~789 No. of ClientsAnalyzed ~1375 Provider Locations Client Locations Key Client Locations • Bengaluru Area, India • Mumbai Area, India • National Capital Region, India • Pune Area, India • Hyderabad Area, India • Chennai Area, India • San Francisco Bay Area, United States • Greater New York City Area, United States Key Provider Locations • Bengaluru Area, India • Hyderabad Area, India • National Capital Region, India • Chennai Area, India • Pune Area, India • Mumbai Area, India • Kolkata Area, India • Paris Area, France • Madrid Area, Spain • Sao Paulo Area, Brazil Split by Industries Key OEM’s KeyServiceProviders 25% 3% 4% 4% 4% 4% 5% 5% 10% 12% 22% Others ConsumerSoftware Food, Beverages &ConsumerGoods Pharmaceutical Retail Energy & Utilities Insurance Automotive Enterprise Software Telecommunications Banking & Financial Services
  • 10. 10 Industries Snapshot(1/5): Banking & Financial Services Source: Draup Outsourcing Module, updatedinMay2023 Top Service Providers Top Client MSA Top Provider MSA Key Workloads • Bengaluru Area, India • Mumbai Area, India • Bengaluru Area, India • Mumbai Area, India • Analysisof business requirements and implementingrules inAbinitioandAWS • Workingwith Designdiagrams using Microsoft Visio • Chennai Area, India • Pune Area, India • Bengaluru Area, India • HyderabadArea, India • Monitorizationof P1, P2 andIncident tickets through Service Now • Analysisof Openandmanaged incidents using Service Now • Bengaluru Area, India • Pune Area, India • Bengaluru Area, India • Chennai Area, India • CBA risk management teaminthe investigationof data breachincidents • Performance of change management for DLPservices • Singapore • Pune Area, India • HyderabadArea, India • Pune Area, India • Along withSSP, SEAS, and ICC applications in all environments • Migrationof all partners (Internal, External, VPN partners) fromGIS • Mumbai Area, India • Greater Boston Area, United States • Bengaluru Area, India • National Capital Region, India • Administrationandconfigurationof Web sphere ApplicationServerWAS V8.5.5 and WAS V9.0 on Linux OS • Configuration offirewall rulesand troubleshootingthe issues Top ServiceProvidersEngagement Snapshot Top Clients Top Client MSA Top Provider MSA Key Workloads • Chennai Area, India • Singapore • HyderabadArea, India • Chennai Area, India • Able to handle all admin tasks onSIEM products • Reporting andtroubleshootingof log sources not reporting to SIEM • HyderabadArea, India • Pune Area, India • Pune Area, India • HyderabadArea, India • Implementationof customer risk rating criteria withKYCmanagement and procedure for bothconsumer and corporate customer • Pune Area, India • Mumbai Area, India • Bengaluru Area, India • Pune Area, India • Analysisof cybersecuritytech lead and handlinga team whichis responsible forsupporting the access management of SAPsystems • Mumbai Area, India • Mumbai Area, India • HyderabadArea, India • Workingwith vendors to get Security Infrastructure to work smoothly • Loan eligibilityDetailswill be provided byAPIs • Mumbai Area, India • Mumbai Area, India • National Capital Region, India • ImplementationandConfigurationof Cisco 800/1900 SeriesRouters and routing protocols • Configuration ofrouters and switches forbackup Top ClientsEngagement Snapshot Key ServiceProviders Key Clients Total Number of Clients Analyzed ~240 Total Number of Service ProviderAnalyzed ~265 Workforce analyzed ~13K-14K
  • 11. 11 www.draup.com HOUSTON I BANGALORE © 2023 DRAUP. All Rights Reserved. info@draup.com