SlideShare a Scribd company logo
1 of 38
Download to read offline
CYBERSECURITY INDUSTRY 2020
BRING THE NOISE
March 5, 2020
Phil Agcaoili
Simple can be harder than complex.
You have to work hard to get your
thinking clean to make it simple.
But it’s worth it in the end, because
once you get there, you can move
mountains.
Steve Jobs, 1998
Research
2019 Key Trends
Another record-breaking year for the industry
 $27.6 billion in M&A volume
 $8.9 billion inVC investments
 Over 3,500 Cybersecurity companies
Source: Momentum Cyber - Cybersecurity Almanac 2020
Source: Market and Markets, 2019
Exits (IPO)
Low Likelihood
 The IPO market was similarly robust in 2018 with 10 IPOs
completed globally.
 Avast Software,Tenable, Zscalar, and Carbon Black raised over USD
$150 million with a valuation of USD $1 billion or higher.
 Combined, these four companies raised $1.4 billion
 Nearly double the amount raised by the top 4 cybersecurity IPOs in 2017.
 The Cybersecurity IPO market remained active with 4
Cybersecurity companies going public in 2019
 Ping Identity, Crowdstrike,Tufin, & CloudFlare.
 Public markets exited 2019 at all-time market highs, with high-growth
Cybersecurity companies leading major indices.
Exits (M&A)
Medium Likelihood
Exits (Death)
High Likelihood
 Cuts both ways
 Lost investments
 EOL support?
 Where’d the data go?
Lost in the Crowd - Vendors
 Where do you fit?
 What verticals?
 Who defines the verticals you are in?
 Are there multiple overlapping verticals that
compete with you?
 How are your customers funding your tech?
 Do potential customers know about you?
 Are you relevant? How do you differentiate from
your competition?
Keeping Up - CISOs
 What do you use to fill in gaps/address risks? Deal with
compliance needs?
 Do you have the resources/support to address needs?Triage?
 How do you keep up with the technology landscape?
 Internal/External support?
 Do you have enough support? Resources?
 What are your priorities?
 2020, 2021, and 2022?
 Are you looking far enough ahead?
 What is your likelihood for deployment or use success/failure?
CybersecurityIndustryFramework
Source: Momentum Cyber - Cybersecurity Almanac 2020
Source: Momentum Cyber - Cybersecurity Almanac 2020
Closing Thoughts
 We have to stop listening to and promulgating FUD.
 We can’t allow ourselves to become paralyzed by the
overwhelming nature of the growing cybersecurity
technology landscape.
 We can’t bury our heads in the sand and hope the
board will continue to approve the purchase of the
next greatest cybersecurity technology.
 There’s too much competition in the market and are
driven by growth and profitability, the most likely exit
is oblivion.
 We must get back to basics of building and
maintaining simple and measurable cybersecurity
programs.
Cybersecurity Market 2020 - Bring the Noise

More Related Content

What's hot

Digital Transformation: A necessary technology disruption
Digital Transformation:  A necessary technology disruptionDigital Transformation:  A necessary technology disruption
Digital Transformation: A necessary technology disruptionFausto Pasqualetti
 
Leading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferLeading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferRobin Teigland
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economyAndry Alamsyah
 
Linking Business strategy to digitalization, innovation & industry 4.0
Linking Business strategy to digitalization, innovation & industry 4.0Linking Business strategy to digitalization, innovation & industry 4.0
Linking Business strategy to digitalization, innovation & industry 4.0Vikram Bhonsle
 
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Benjamin Rohé
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...Career Communications Group
 
New Industrial Revotution and Digital Transformation of Society
New Industrial Revotution and Digital Transformation of SocietyNew Industrial Revotution and Digital Transformation of Society
New Industrial Revotution and Digital Transformation of SocietyRobin Teigland
 
digital production and the 4th industrial revolution
digital production and the 4th industrial revolutiondigital production and the 4th industrial revolution
digital production and the 4th industrial revolutionRoberto Siagri
 
new platform economy China
new platform economy Chinanew platform economy China
new platform economy ChinaMartin Kenney
 
MIS in Asia: Opportunity to Lead
MIS in Asia: Opportunity to LeadMIS in Asia: Opportunity to Lead
MIS in Asia: Opportunity to LeadRob Cayzer
 
Iran's Tech & Investment Scene
Iran's Tech & Investment SceneIran's Tech & Investment Scene
Iran's Tech & Investment SceneMasoud Hamidzadeh
 
Redefining Literacy in a Technologically Advanced World
Redefining Literacy in a Technologically Advanced WorldRedefining Literacy in a Technologically Advanced World
Redefining Literacy in a Technologically Advanced WorldVincent Lau
 
Boards and AI Governance_West Sweden Chamber of Commerce
Boards and AI Governance_West Sweden Chamber of CommerceBoards and AI Governance_West Sweden Chamber of Commerce
Boards and AI Governance_West Sweden Chamber of CommerceRobin Teigland
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessPrecisely
 

What's hot (20)

CIM history and 4IR
CIM history and 4IRCIM history and 4IR
CIM history and 4IR
 
Digital Transformation: A necessary technology disruption
Digital Transformation:  A necessary technology disruptionDigital Transformation:  A necessary technology disruption
Digital Transformation: A necessary technology disruption
 
Technology Trend 2019
Technology Trend 2019Technology Trend 2019
Technology Trend 2019
 
Leading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferLeading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School Comfer
 
CII: Addressing Gender Bias in Artificial Intelligence
CII: Addressing Gender Bias in Artificial IntelligenceCII: Addressing Gender Bias in Artificial Intelligence
CII: Addressing Gender Bias in Artificial Intelligence
 
Automation, ai and jobs
Automation, ai  and jobsAutomation, ai  and jobs
Automation, ai and jobs
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economy
 
Linking Business strategy to digitalization, innovation & industry 4.0
Linking Business strategy to digitalization, innovation & industry 4.0Linking Business strategy to digitalization, innovation & industry 4.0
Linking Business strategy to digitalization, innovation & industry 4.0
 
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
 
The technology trends of 2020
The technology trends of 2020The technology trends of 2020
The technology trends of 2020
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...
 
Extreme Digital Ventures
Extreme Digital VenturesExtreme Digital Ventures
Extreme Digital Ventures
 
New Industrial Revotution and Digital Transformation of Society
New Industrial Revotution and Digital Transformation of SocietyNew Industrial Revotution and Digital Transformation of Society
New Industrial Revotution and Digital Transformation of Society
 
digital production and the 4th industrial revolution
digital production and the 4th industrial revolutiondigital production and the 4th industrial revolution
digital production and the 4th industrial revolution
 
new platform economy China
new platform economy Chinanew platform economy China
new platform economy China
 
MIS in Asia: Opportunity to Lead
MIS in Asia: Opportunity to LeadMIS in Asia: Opportunity to Lead
MIS in Asia: Opportunity to Lead
 
Iran's Tech & Investment Scene
Iran's Tech & Investment SceneIran's Tech & Investment Scene
Iran's Tech & Investment Scene
 
Redefining Literacy in a Technologically Advanced World
Redefining Literacy in a Technologically Advanced WorldRedefining Literacy in a Technologically Advanced World
Redefining Literacy in a Technologically Advanced World
 
Boards and AI Governance_West Sweden Chamber of Commerce
Boards and AI Governance_West Sweden Chamber of CommerceBoards and AI Governance_West Sweden Chamber of Commerce
Boards and AI Governance_West Sweden Chamber of Commerce
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your Business
 

Similar to Cybersecurity Market 2020 - Bring the Noise

MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Matteo Fabiano
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
ARK Invest Big Ideas 2020
ARK Invest Big Ideas 2020 ARK Invest Big Ideas 2020
ARK Invest Big Ideas 2020 jasonmariposa
 
The Black Swan Event: Funding in the time of Coronavirus with Mark Suster
The Black Swan Event: Funding in the time of Coronavirus with Mark SusterThe Black Swan Event: Funding in the time of Coronavirus with Mark Suster
The Black Swan Event: Funding in the time of Coronavirus with Mark Sustersaastr
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023Bernard Marr
 
Stott & May Salary Survey
Stott & May Salary SurveyStott & May Salary Survey
Stott & May Salary SurveyAlly Esmaeili
 
Seven Forces Reshaping Enterprise Software
Seven Forces Reshaping Enterprise SoftwareSeven Forces Reshaping Enterprise Software
Seven Forces Reshaping Enterprise SoftwareBoston Consulting Group
 
The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19Finch Capital
 
Forecast 2019
Forecast 2019Forecast 2019
Forecast 2019Ubiwhere
 
Technology| What needs to happen for Canada and the World
Technology| What needs to happen for Canada and the WorldTechnology| What needs to happen for Canada and the World
Technology| What needs to happen for Canada and the Worldpaul young cpa, cga
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Bashar H. Malkawi, Global IP and technology disputes forum
Bashar H. Malkawi, Global IP and technology disputes forumBashar H. Malkawi, Global IP and technology disputes forum
Bashar H. Malkawi, Global IP and technology disputes forumBashar H Malkawi
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Data Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportData Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportEvelyn Yannan Chen
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018Chelsea Dickson
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018Aftab Jamil
 

Similar to Cybersecurity Market 2020 - Bring the Noise (20)

Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
ARK Invest Big Ideas 2020
ARK Invest Big Ideas 2020 ARK Invest Big Ideas 2020
ARK Invest Big Ideas 2020
 
The Black Swan Event: Funding in the time of Coronavirus with Mark Suster
The Black Swan Event: Funding in the time of Coronavirus with Mark SusterThe Black Swan Event: Funding in the time of Coronavirus with Mark Suster
The Black Swan Event: Funding in the time of Coronavirus with Mark Suster
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023
 
Stott & May Salary Survey
Stott & May Salary SurveyStott & May Salary Survey
Stott & May Salary Survey
 
Seven Forces Reshaping Enterprise Software
Seven Forces Reshaping Enterprise SoftwareSeven Forces Reshaping Enterprise Software
Seven Forces Reshaping Enterprise Software
 
Stott & May - Report
Stott & May - ReportStott & May - Report
Stott & May - Report
 
The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19
 
Forecast 2019
Forecast 2019Forecast 2019
Forecast 2019
 
Insurance claim management
Insurance claim managementInsurance claim management
Insurance claim management
 
Technology| What needs to happen for Canada and the World
Technology| What needs to happen for Canada and the WorldTechnology| What needs to happen for Canada and the World
Technology| What needs to happen for Canada and the World
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Bashar H. Malkawi, Global IP and technology disputes forum
Bashar H. Malkawi, Global IP and technology disputes forumBashar H. Malkawi, Global IP and technology disputes forum
Bashar H. Malkawi, Global IP and technology disputes forum
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Data Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportData Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A Report
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018
 

More from Phil Agcaoili

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingPhil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for SecurityPhil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...Phil Agcaoili
 

More from Phil Agcaoili (20)

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cybersecurity Market 2020 - Bring the Noise

  • 1. CYBERSECURITY INDUSTRY 2020 BRING THE NOISE March 5, 2020 Phil Agcaoili
  • 2. Simple can be harder than complex. You have to work hard to get your thinking clean to make it simple. But it’s worth it in the end, because once you get there, you can move mountains. Steve Jobs, 1998
  • 4. 2019 Key Trends Another record-breaking year for the industry  $27.6 billion in M&A volume  $8.9 billion inVC investments  Over 3,500 Cybersecurity companies Source: Momentum Cyber - Cybersecurity Almanac 2020
  • 5.
  • 6.
  • 7. Source: Market and Markets, 2019
  • 8. Exits (IPO) Low Likelihood  The IPO market was similarly robust in 2018 with 10 IPOs completed globally.  Avast Software,Tenable, Zscalar, and Carbon Black raised over USD $150 million with a valuation of USD $1 billion or higher.  Combined, these four companies raised $1.4 billion  Nearly double the amount raised by the top 4 cybersecurity IPOs in 2017.  The Cybersecurity IPO market remained active with 4 Cybersecurity companies going public in 2019  Ping Identity, Crowdstrike,Tufin, & CloudFlare.  Public markets exited 2019 at all-time market highs, with high-growth Cybersecurity companies leading major indices.
  • 10. Exits (Death) High Likelihood  Cuts both ways  Lost investments  EOL support?  Where’d the data go?
  • 11. Lost in the Crowd - Vendors  Where do you fit?  What verticals?  Who defines the verticals you are in?  Are there multiple overlapping verticals that compete with you?  How are your customers funding your tech?  Do potential customers know about you?  Are you relevant? How do you differentiate from your competition?
  • 12. Keeping Up - CISOs  What do you use to fill in gaps/address risks? Deal with compliance needs?  Do you have the resources/support to address needs?Triage?  How do you keep up with the technology landscape?  Internal/External support?  Do you have enough support? Resources?  What are your priorities?  2020, 2021, and 2022?  Are you looking far enough ahead?  What is your likelihood for deployment or use success/failure?
  • 14. Source: Momentum Cyber - Cybersecurity Almanac 2020
  • 15. Source: Momentum Cyber - Cybersecurity Almanac 2020
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Closing Thoughts  We have to stop listening to and promulgating FUD.  We can’t allow ourselves to become paralyzed by the overwhelming nature of the growing cybersecurity technology landscape.  We can’t bury our heads in the sand and hope the board will continue to approve the purchase of the next greatest cybersecurity technology.  There’s too much competition in the market and are driven by growth and profitability, the most likely exit is oblivion.  We must get back to basics of building and maintaining simple and measurable cybersecurity programs.