Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Grey Logic


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Grey Logic

  1. 1. GreyLogic<br />Cyber Intelligence Market and Competitor Research<br />13 November 2009<br />
  2. 2. Requirements<br />Who are the potential customers for a weekly newsletter summarizing and analyzing trends in various cyber threats and for tailored intelligence briefings in the United States (US) and the European Union (EU)?<br />Who are GreyLogic’s competitors and how deep is the market penetrated by them?<br />What are the “best practices” among companies providing timely intelligence to private and government clients in the US and the EU?<br />Competitors&apos; services&apos; pricing structure from a starting company to a mature business.<br />What types of products and services do these companies provide?<br />What is the companies&apos; marketing strategy?<br />2<br />
  3. 3. Agenda<br /><ul><li>Key Findings</li></ul>Customers<br /><ul><li>Government
  4. 4. Private Sector
  5. 5. Academia</li></ul>Competitors<br /><ul><li>Market Penetration
  6. 6. Best Practices
  7. 7. Service Pricing
  8. 8. Products and Services
  9. 9. Marketing Strategies</li></ul>3<br />
  10. 10. Key Findings<br /><ul><li>Top 12 Customers</li></ul>1. Cyber Security Management Center (CSMC) (US)<br />2. Defense Information Systems Agency (DISA) (US)<br />3. Department of Energy (DOE) (US)<br />4. Department of State (US)<br />5. United States Postal Service (USPS) (US)<br />6. National Aeronautics and Space Administration (NASA) (US)<br />7. Ebay (US)<br />8. Western Union (US)<br />9. Arsys (EU)<br />10. Facebook (US)<br />11. LiveJournal (US)<br />12. Twitter (US)<br />4<br />
  11. 11. Key Findings<br /> The best markets for a weekly cyber intelligence brief are likely:<br />Large US government agencies and secondly large private companies with,<br />Cyber or national security missions<br />Services provided through IT<br />European market highly fragmented<br />Diversity – numerous separate markets<br />Best markets within EU: UK and countries in Russia’s sphere of influence, such as Estonia and Poland<br />5<br />
  12. 12. Key Findings<br /> 51 Total Organizations<br />Government : 17<br />Private Sector: 23<br />Academia: 11<br />United States: 35<br />European Union: 16<br />Source: Created by analyst<br />6<br />
  13. 13. Customers - Government<br /><ul><li>9 out of 17 victims of cyber attack
  14. 14. 7 out of those 9 were US government agencies
  15. 15. 14 out of 17 are high or moderately high-value targets
  16. 16. Disruption would have symbolic, financial, political, or tactical consequences
  17. 17. Critical Infrastructure and Key Resources (CIKR) sectors</li></ul>7<br />
  18. 18. Customers - Government<br /><ul><li> 12 out of 17 have IT- or national security centric missions
  19. 19. i.e. Cyber Security Management Center, Defense Information Systems Agency</li></ul> 9 out of 17 rely on private companies or Information Sharing and Analysis Centers (ISACs) for cyber security services<br />8<br />
  20. 20. Customers - Government<br />Top Five Government Customers<br />Cyber Security Management Center (CSMC)<br />Defense Information Systems Agency (DISA)<br />Department of Energy (DOE)<br />Department of State (DOS)<br />United States Postal Service (USPS)<br />9<br />
  21. 21. Department of State<br />Contact Information:<br />Susan Swart, Chief Information Officer, Phone: 202-647-2889<br />Charles D. Wisecarver, Deputy Chief Information Officer, 202-647-2863<br />Robert K. Nowak, Director of IT Infrastructure, 202-647-1001<br />John Streufert, Director of Information Assurance, 703-812-2500<br />Cheryl Hess, Director of Information Security Programs for the Bureau of Diplomatic Security, 571-345-3080<br />Organizational structure of Dept. of State contact persons. Source: Created by analyst<br />10<br />
  22. 22. Department of Energy<br />Contact Information:Patrick FerraroDirector of the Office of Headquarters Procurement ServicesPhone: 202-287-1500Fax:<br />Roadrunner, the world&apos;s most powerful supercomputer, is located at DOE’s Los Alamos National Laboratory. Source: Department of Energy<br />11<br />
  23. 23. Customers - Business<br /><ul><li>Private sector customers 45 percent (23 of 51) of all identified customers
  24. 24. Large companies that recognize the importance of IT to their mission, like eBay, Facebook, and Twitter are likely to invest in cyber threat prevention</li></ul>12<br />
  25. 25. Customers - Business<br />Top six private sector customers<br />Western Union<br />Arsys<br />Ebay<br />Facebook<br />LiveJournal<br />Twitter<br />13<br />
  26. 26. Customers - Academia<br /><ul><li>Verified by the NSA
  27. 27. Cylab, Tallinn University of Technology, Georgia Tech, Indiana University and Mississippi State
  28. 28. Grants to conduct research are the most likely to purchase cyber security intelligence
  29. 29. It is likely the NSA will acknowledge more academic institutions in the future
  30. 30. 29 acknowledged in 2009</li></ul>14<br />
  31. 31. Customers - Academia<br />Top five customers in academia<br />CyLab at Carnegie Mellon University (US)<br />Tallinn University of Technology in (EU)<br />Georgia Tech Information Security Center (US)<br />Center for Applied Cybersecurity Research (CACR) at Indiana University (US)<br />Center for Computer Security and Research (CCSR) at Mississippi State (US)<br />15<br />
  32. 32. Competitors<br />16<br />20 competitors identified<br />No direct competitors<br />Closest competitors<br />iDefense Labs (US)<br />iSIGHT Partners (US)<br />SecureWorks (US)<br />More demand for cyber security than intelligence<br />12 out of 18 US competitors were located in Washington, DC<br />
  33. 33. Competitors<br /><ul><li>Identified Competitors</li></ul>Cyber Defense Agency (CDA) (US)<br />Cyber Security Research and Development Center (US)<br />Cyveillance (US)<br />DanchoDanchev (EU)<br />Department of Homeland Security US-CERT(US)<br />Ernst & Young (EU)<br />EWA Information and Infrastructure Technologies, Inc. (US)<br />Fortify (US)<br />Global Security Mag (EU)<br />iDefense Labs (US)<br />iJET Intelligent Risk Systems (US)<br />Informatica (US)<br />IT – Information Sharing and Analysis Center (US)<br />iSIGHT Partners (US)<br />Lookingglass (US)<br />Multi-State Information Sharing Analysis Center (US)<br />nCircle (US)<br />SecureWorks (US)<br />Trend Micro (US)<br />United States Cyber Consequence Unit (US)<br />17<br />
  34. 34. Market Penetration<br />United States<br />Government market highly penetrated<br />Private sector emerging market with fast growth<br />Private sector comprises of 85 percent of the nation’s cyber infrastructure<br />Increase in cyber attacks, especially against businesses – larger financial losses<br />Demand for cyber security – not intelligence<br />European Union<br />Primary untapped and fragmented market<br />18<br />
  35. 35. Industry Best Practices<br />Service Pricing<br />Unavailable – gradual pricing<br />Products and Services<br />Training<br />Security Policy Engineering<br />19<br />
  36. 36. Industry Best Practices<br />Marketing Strategies<br />Strategic Alliances<br />Online Community Building – Industry Visibility<br />46 percent of sales directly from vendor according to Trusted Strategies<br />20<br />
  37. 37. Contact Information<br /> Henry Peltokangas(814) 823-3400hpeltokangas@gmail.comhpelto28@mercyhurst.eduJustin Smithjsmith16@mercyhurst.edujmsmith16@gmail.comJennifer Jarema(216)<br />Chris Dyakon(814) 392-9307chrisdyakon@gmail.comcdyako57@mercyhurst.eduAustin Ewing(814) 598-0035aewing56@gmail.comaewing56@mercyhurst.eduPerry Avery(330) 348-6916perry.avery@gmail.comCarolyn Venditti(717)<br />21<br />