Cyber threat analytics, cyber threat detection, and cybersecurity for data privacy & protection are the most common use cases across industries. Download the report to read about the regional hotspots, associated players, cybersecurity ecosystems, and more.
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Trends.pdf
1. 1
Source: Draup
1
Report on Cybersecurity: Workload and
Hiring Analysis
An Analysis by Draup
19th May 2023
The document aims to providethe IndustryOverview, Industry Ecosystem,
Processes, Skills and Competencies, Cybersecurity Footprint, Outsourcing
overview, and Key Industries Snapshotfor Cybersecurity Analysis.
CLICK HERE
Toaccess the full report
2. 2
Use Case Cluster Solution
Telecommunications
Enterprise
Software
Insurance
Hospital &
Healthcare
Professional
Services
Banking &
Financial Services
Consumer Electronics Aerospace Industrial
CyberThreatAnalytics
CyberThreat
DetectionusingAI
CyberThreat
Analytics
Cybersecurityfor
Connected
Medical Devices
CyberThreat
Analytics
Cybersecurityfor
Data Privacy&
Protection
Cybersecurityfor
ConsumerElectronics
Devices
Cybersecurityfor
Industrial
Automation&
Control Systems
CyberThreat
Analytics
CyberThreatDetection
usingAI
CyberThreat
Analytics
Cybersecurity
for Data
Privacy&
Protection
CyberThreat
Analytics
Cybersecurity
for Data
Privacy&
Protection
CyberThreat
DetectionusingAI
CyberSecurity
Modernization
CyberThreat
Analytics
Cybersecurityfor
Industrial
Automation&
Control Systems
Cybersecurityfor
Industrial Automation&
Control Systems
Cybersecurityfor
Data Privacy&
Protection
CyberSecurity
Modernization
CyberThreat
DetectionusingAI
CyberThreat
Detection
usingAI
CyberThreat
Analytics
CyberThreatDetection
usingAI
CyberThreat
DetectionusingAI
CyberThreat
Prediction
CyberSecurity
Modernization
Cybersecurityfor
Industrial
Automation&
Control Systems
CyberThreat
Detectionusing
AI
CyberSecurity
Modernization
CyberAssist
App
CyberSecurity
Modernization
CyberThreatAnalytics
CyberThreat
Prediction
CyberThreat
DetectionusingAI
CyberThreatPrediction CyberAssistApp
CyberThreat
Prediction
CyberThreat
Prediction
CyberThreat
Prediction
CybersecurityforData
Privacy& Protection
Cybersecurity
for Gaming
CybersecurityforPower
PlantAutomation&
Control Systems
Cybersecurity for
ConnectedMedical
Devices
CyberThreatPrediction
Cybersecurity-related Usecases across Industries(1/3): Telecommunication, Enterprise Software, Insurance, and
Hospital & Healthcare are the key industry in cybersecurity services
Source: Draup Analysis, DraupBusinessIntentions.
Note: Digital Use Cases capturedare not exhaustive
Low Medium High
Intensity
3. 3
Source: Newsroom AndPress Release of HCL,Fortinet, Charter Communications, SecurityBridge, and PaloAlto
Ciscoto provide aunified, AI-driven,cross-
domain securityplatform, calledCisco’snew
XDR solutionwithadvancedfeaturesforDuo
MFA to helporganizationsbetterprotectthe
integrityof theirentireITecosystem.
SpectrumEnterprise,apartof Charter
Communications,Inc.,partneredwithCiscoto
provide Secure Access with CiscoDuo and Cloud
Security with Cisco+ Secure Connectto itsportfolio
of cybersecurityproducts for secure accessto
informationonprivate networksorpublicclouds.
HCL TechnologiespartneredwithMicrosoftto
combine HCL's cybersecurityfusionplatform with
Microsoft’ssecurity products,like Azure Sentinel
and Microsoft365 E5, coveringidentityandaccess,
informationprotection,andhybridcloud
infrastructure securityforenterprises.
DigiCertpartneredwithOracle toprovide
DigiCertONE,the platformfordigital trust.
Oracle CloudInfrastructure (OCI) provides
customerswithapowerful combinationof
solutions tosafeguardtheirdata and secure
theirassets.
SecurityBridgepartneredwithFortiGate to
integrate the FortiGate solutionforSAP,
enablingan unprecedented,advancedlevel of
securityinsight, speed,andprotection.
AI-Driven
XDR
Solution
End-to-End
Solution
Cybersecurity
Fusion
Platform
Data
Security
Solution
Advanced
Security
Intelligent
Cybersecurity
AllianzpartneredwithCoalitiontoexpanditscyber
businessforSME and mid-sizedcompaniesinkey
markets.Proactivelymonitoringandresolvingcyber
riskssubstantiallyhelpscustomersprotecttheir
businessesandpreventsfinancial losses.
Cybersecurity
for
SME
Health
Insurance
Cybersecurity
Cyber-Risk
Transfer
MunichRe partnerswithGoogle CloudandAllianz
to bring market-leadingcyberrisk-transfer
expertise withGoogle Cloud’ssecurityknow-howto
addressspecificclientneeds.
CignapartneredwithShiftTechnologytoevaluate
Shift’sfrauddetectionsolutionForce tosupportits
InternationalOperationsUnit,whichmanages
international grouphealthinsurance,tostrengthenits
fraud detectioncapabilitieswithinthe claims process.
NTT Ltd partneredwithPaloAltotobringtogether
NTT Ltd.’s‘Secure byDesign’serviceswithPaloAlto
NetworksPrisma™AccessandCortex™XSOAR
technologiesandfocusonthe intelligent
workplace,intelligentinfrastructure,and
intelligentcybersecurity.
Partnership Inhouse
Telecommunications Enterprise Software Insurance
Industry Ecosystem (1/9): Telecommunication, Enterprise Software, and Insurance Industries focus on solutions like
Intelligent Cybersecurity, Cybersecurity Fusion Platforms, and Insurance Cybersecurity
4. 4
Application Security: Applications are connected across multiple networks, including the cloud, which leaves them
open to all cloud threats and vulnerabilities, so application security is a tool to prevent cyberattacks
Summary
• Application security secures an application
throughout its life cycle by three states that are
building secure applications on secure
workloads, securing applications during runtime,
including access of applications to users &
devices, and maintaining adaptative security on
applications as they change and get updated.
• Runtime Application Self-Protection (RASP)
provides personalized application protections
based on insight into internal data.
• Static Application Security Testing (SAST) is a
security testing method to analyze source code
for vulnerability and Dynamic Application
Security Testing (DAST) provides insight into how
applications behave during production.
• Web application security is the practice of protecting websites, applications, and APIs from
attacks. It aims to keep web applications functioning smoothly and protect businesses from
cyber vandalism, data theft, unethical competition, and other negative consequences.
Web Application
Security
Features
Cloud Native
Application
Security
• Mobile application security focuses on the software security posture of mobile apps on
Android, iOS, and Windows Phone platforms. It involves assessing applications for security
issues in the contexts of the media they are designed to run on, the frameworks they are
developed with, and the anticipated set of users.
Mobile
Application
Security
• Cloud-native application security is a cloud-first approach used to deploy applications
securely at scale by embedding security intothe software development lifecycle todetect
vulnerabilities earlier with methodologies like shift left security strategies, zero-trust
architecture, etc.
Application security is a set of measures designed to prevent data or code at the application level from
being stolen or manipulated. Itinvolves security during application development, design phases, and
systems and approaches thatprotectapplications after deployment.
Types Of
Solutions
Source: Various companies’ websites, Market Reports, Press & Media Releases.
6. 6
Globalization Footprint: Americas region dominates the cybersecurity global Technology workforce landscape
Source: Draup Globalization Module, updatedinMay2023
Note: The representeddata illustrates the numberof centers byGeography, and the bubble size is proportional to the overall HCInstalled in the area.
Global Footprint For Cybersecurity
Americas
EMEA
APAC
8203K – 8204K
Total Number of Technologyworkforce Installed
~960
Total Number of TechnologyLocations
3080K - 3090K
339
Key Locations
• Paris Area,France
• London, United Kingdom
• Madrid Area, Spain
• Munich Area, Germany
• Amsterdam Area, Netherlands
• Johannesburg, Gauteng, South
Africa
• Milan Area,Italy
• Stockholm, Sweden
• Stuttgart Area, Germany
Key Locations
• Bengaluru Area, India
• National Capital Region,India
• Pune Area, India
• Chennai Area, India
• Shanghai Area, China
• Hyderabad Area, India
• BeijingArea, China
• Singapore
• Tokyo, Japan
• Sydney, Australia
2473K – 2474K
126
2640K – 2641K
495
Key Locations
• San Francisco Bay Area,United States
• Greater New York City Area, United States
• Washington D.C. Metro Area, United States
• Sao Paulo Area, Brazil
• Greater Seattle Area, United States
• Dallas/FortWorth Area, United States
Greater Boston Area, United States
• Greater Los Angeles Area, United States
• Toronto, Canada Area
• Greater Chicago Area, United States
• Greater Atlanta Area, United States
30%
38%
32%
Technology Headcounts
Number of Technology
Locations
7. 7
Americas Region Cybersecurity Footprint: San Francisco Bay Area, Greater New York City Area, and Washington D.C.
Metro Area, United States, are the major MSA locations across the Americas region
Source: Draup Globalization Module, updatedinMay2023
Note: The representeddata illustratesthe numberofcenters byGeography.
Key Focus Areas
Associated Players
Top MSA Locations across AmericaRegion
Total Headcount: ~3089K
Other ER&D MSA Locations
Key Hotspots (Top 15 MSA Locations)
Note: Key Hotspots arecurated basedon theheadcountintensity
Total Number ofLocations: ~339
GreaterLos Angeles Area, United States
San Francisco Bay Area, United States
GreaterNewYork City Area,United States
GreaterChicago Area, United States
• The shift to virtualized IT environments, such as the
infrastructure, data, and cloud computing network, led
to many organizations facing cyberattacks due to the
security vulnerability of remote work. North America is
the dominant region in this market. Cloud Security is
the fastest-developing market subsegment.
• Key providers install advanced IT security solutions to
protect sensitive information related to manufacturing
operations while increasing productivity.
GreaterBoston Area,UnitedStates
GreaterDetroitArea, UnitedStates
Sao PauloArea, Brazil
Dallas/Fort Worth Area,UnitedStates
GreaterPhiladelphia Area, United States
Toronto, Canada Area
GreaterSeattle Area, United States
WashingtonD.C.Metro Area,United States
GreaterAtlanta Area, UnitedStates
Houston, Texas Area, United States
GreaterMinneapolis-St. PaulArea,UnitedStates
8. 8
Key Location Highlights: San Francisco Bay Area, United States, dominates Cybersecurity in Americas region
Source: Draup Globalization Module
Note: The Locations mentionedabove are the keylocations forsmart home appliancesinthe Americas region;SOAR-SecurityOrchestration, Automation, and Response;SIEM- SecurityInformationandEvent Management
Locations Headcount Key Companies Functional Workload Description
San Francisco Bay Area,
United States
259K - 260K
• Cybersecurity
• Artificial Intelligence & Data
Science
• Game Design & Development
• Protect enterprise customers from cyber attacks, transforming their
security operations with Chronicle SIEM / SOAR, BeyondCorp, Security
Command Center, Security Foundation, and Mandiant
Greater New York City
Area, United States
245K - 246K
• Cybersecurity
• Cloud Computing
• UI/UX Design
• Implement frameworks for Operational Risk Appetite and Key Risk
Indicators (KRIs), yielding a structured approach to the management,
measurement, monitoring, governance, and control of technology and
cybersecurity risks
Washington D.C. Metro
Area, United States
178K - 179K
• Cybersecurity
• Aerospace Testing &
Simulation
• Data Engineering
• Leading the Client Cyber Tabletop Exercise team, delivering tabletop
exercise scenarios to clients of the firm
• Define and enforce cyber security policies and standards across the
organization in support of operations and compliance
Sao Paulo Area, Brazil 145K - 146K
• Cybersecurity
• Software Testing
• Application Development &
Maintenance
• Implementation of effective risk management programs, execution
and monitoring of technology risk and control processes as required
• Support the documentation process of information risk control
issues/gaps and the remediation plans, investigating and resolving
control incidents
Greater Seattle Area,
United States
125K – 126K
• Cybersecurity
• Mobile Application
Development
• Manufacturing Engineering
• Streamline and strengthen their security program across
multiplatform, multi-cloud environments
• Envisioning CISOs in the secure journey to the cloud and prioritizing
quick wins in the fight against cyberadversaries, risks, and threats
9. 9
Vendor Engagement: TCS, HCL, Wipro, Cognizant, and Infosys are the leading Cybersecurity services providers in
Cybersecurity Outsourcing Market
Source: Draup Outsourcing Module, updatedinMay2023
Total Outsourcing Headcount
57K – 58K
No. of Service ProvidersAnalyzed
~789
No. of ClientsAnalyzed
~1375
Provider Locations
Client Locations
Key Client Locations
• Bengaluru Area, India
• Mumbai Area, India
• National Capital Region,
India
• Pune Area, India
• Hyderabad Area, India
• Chennai Area, India
• San Francisco Bay Area,
United States
• Greater New York City Area,
United States
Key Provider Locations
• Bengaluru Area, India
• Hyderabad Area, India
• National Capital Region,
India
• Chennai Area, India
• Pune Area, India
• Mumbai Area, India
• Kolkata Area, India
• Paris Area, France
• Madrid Area, Spain
• Sao Paulo Area, Brazil
Split by Industries
Key OEM’s KeyServiceProviders
25%
3%
4%
4%
4%
4%
5%
5%
10%
12%
22%
Others
ConsumerSoftware
Food, Beverages &ConsumerGoods
Pharmaceutical
Retail
Energy & Utilities
Insurance
Automotive
Enterprise Software
Telecommunications
Banking & Financial Services
10. 10
Industries Snapshot(1/5): Banking & Financial Services
Source: Draup Outsourcing Module, updatedinMay2023
Top Service
Providers
Top Client MSA Top Provider MSA Key Workloads
• Bengaluru Area,
India
• Mumbai Area, India
• Bengaluru Area, India
• Mumbai Area, India
• Analysisof business requirements and
implementingrules inAbinitioandAWS
• Workingwith Designdiagrams using
Microsoft Visio
• Chennai Area, India
• Pune Area, India
• Bengaluru Area, India
• HyderabadArea,
India
• Monitorizationof P1, P2 andIncident
tickets through Service Now
• Analysisof Openandmanaged
incidents using Service Now
• Bengaluru Area,
India
• Pune Area, India
• Bengaluru Area, India
• Chennai Area, India
• CBA risk management teaminthe
investigationof data breachincidents
• Performance of change management
for DLPservices
• Singapore
• Pune Area, India
• HyderabadArea,
India
• Pune Area, India
• Along withSSP, SEAS, and ICC
applications in all environments
• Migrationof all partners (Internal,
External, VPN partners) fromGIS
• Mumbai Area, India
• Greater Boston
Area, United States
• Bengaluru Area, India
• National Capital
Region, India
• Administrationandconfigurationof
Web sphere ApplicationServerWAS
V8.5.5 and WAS V9.0 on Linux OS
• Configuration offirewall rulesand
troubleshootingthe issues
Top ServiceProvidersEngagement Snapshot
Top Clients Top Client MSA Top Provider MSA Key Workloads
• Chennai Area, India
• Singapore
• HyderabadArea,
India
• Chennai Area, India
• Able to handle all admin tasks onSIEM
products
• Reporting andtroubleshootingof log
sources not reporting to SIEM
• HyderabadArea,
India
• Pune Area, India
• Pune Area, India
• HyderabadArea,
India
• Implementationof customer risk
rating criteria withKYCmanagement
and procedure for bothconsumer and
corporate customer
• Pune Area, India
• Mumbai Area,
India
• Bengaluru Area,
India
• Pune Area, India
• Analysisof cybersecuritytech lead
and handlinga team whichis
responsible forsupporting the access
management of SAPsystems
• Mumbai Area,
India
• Mumbai Area, India
• HyderabadArea,
India
• Workingwith vendors to get Security
Infrastructure to work smoothly
• Loan eligibilityDetailswill be provided
byAPIs
• Mumbai Area,
India
• Mumbai Area, India
• National Capital
Region, India
• ImplementationandConfigurationof
Cisco 800/1900 SeriesRouters and
routing protocols
• Configuration ofrouters and switches
forbackup
Top ClientsEngagement Snapshot
Key ServiceProviders Key Clients
Total Number of Clients Analyzed
~240
Total Number of Service ProviderAnalyzed
~265
Workforce analyzed
~13K-14K