1 / 18

GreyLogic

GreyLogic. Cyber Intelligence Market and Competitor Research. 13 November 2009. Requirements.

erica
Download Presentation

GreyLogic

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. GreyLogic Cyber Intelligence Market and Competitor Research 13 November 2009

  2. Requirements • Who are the potential markets for a weekly newsletter summarizing and analyzing trends in various cyber threats and for tailored intelligence briefings in the United States (US) and the European Union (EU)? • Who are GreyLogic’s competitors and how deep is the market penetrated by them? • What are the “best practices” among companies providing timely intelligence to private and government clients in the US and the EU? • Competitors' services' pricing structure from a starting company to a mature business. • What types of products and services do these companies provide? • What is the companies' marketing strategy?

  3. Agenda • Key Findings • Customers • Government • Private Sector • Academia • Competitors • Market Penetration • Best Practices • Service Pricing • Products and Services • Marketing Strategies

  4. Key Findings • Top 12 Customers 1. Cyber Security Management Center (CSMC) (US) 2. Defense Information Systems Agency (DISA) (US) 3. Department of Energy (DOE) (US) 4. Department of State (US) 5. United States Postal Service (USPS) (US) 6. National Aeronautics and Space Administration (NASA) (US) 7. Ebay (US) 8. Western Union (US) 9. Arsys (EU) 10. Facebook (US) 11. LiveJournal (US) 12. Twitter (US)

  5. Key Findings • The best potential markets for a weekly cyber intelligence brief are likely: • Large US government agencies with cyber or national security missions • Large US companies whose services are only provided through IT

  6. Key Findings • 51 Total Organizations • Government : 17 • Private Sector: 23 • Academia: 11 • United States: 35 • European Union: 16

  7. Key Findings Few direct competitors due to GreyLogic’s specialization in cyber intelligence and not cyber security Cyber intelligence is likely hard to sell to private businesses as an independent product as our research indicates that the sector has higher demand of cyber security services that directly address companies’ needs

  8. Customers - Government • Top Five Government Customers • Cyber Security Management Center (CSMC) • Defense Information Systems Agency (DISA) • Department of Energy (DOE) • Department of State (DOS) • United States Postal Service (USPS)

  9. Customers - Government • More US government agencies have been the victims of cyber attacks. • US government agencies likely to be the most high-value targets for cyber attacks • Government agencies with cyber or national security missions are likely to have a high need for cyber intelligence • US and EU government entities that have significant budgets and currently rely on private companies, Information Sharing and Analysis Centers (ISACs), or similar organizations, to help provide cyber security services likely to purchase additional services.

  10. Department of State • Contact Information: • Susan Swart, Chief Information Officer, Phone: 202-647-2889 • Charles D. Wisecarver, Deputy Chief Information Officer, 202-647-2863 • Robert K. Nowak, Director of IT Infrastructure, 202-647-1001 • John Streufert, Director of Information Assurance, 703-812-2500 • Cheryl Hess, Director of Information Security Programs for the Bureau of Diplomatic Security, 571-345-3080

  11. Customers - Business http://wiki.vibha.org/images/WesternUnion_Color.jpg http://jorgehierro.files.wordpress.com/2009/10/logo-arsys-es.jpg http://www.priceculture.com/wp-content/-uploads/2009/01/ebay1.gif • Top six private sector customers • Western Union • Arsys • Ebay • Facebook • LiveJournal • Twitter

  12. Customers - Business • Private sector customers 45% (23 of 51) of all identified customers • Large companies that recognize the importance of IT to their mission more likely to invest in cyber threat prevention • Best contact person is a Chief Information Officer (CIO) or Chief Information Security Officer (CISO)

  13. Customers - Academia • Top five customers in academia • CyLab at Carnegie Mellon University (US) • Tallinn University of Technology in (EU) • Georgia Tech Information Security Center (US) • Center for Applied Cybersecurity Research (CACR) at Indiana University (US) • Center for Computer Security and Research (CCSR) at Mississippi State (US)

  14. Customers - Academia • Verified by the NSA • Cylab, Tallinn University of Technology, Georgia Tech, Indiana University and Mississippi State • Grants to conduct research are the most likely to purchase cyber security intelligence • It is likely the NSA will acknowledge more academic institutions in the future • 29 acknowledged in 2009

  15. Competitors • Identified Competitors • Cyber Defense Agency (CDA) (US) • Cyber Security Research and Development Center (US) • Cyveillance (US) • DanchoDanchev (EU) • Department of Homeland Security US-CERT(US) • Ernst & Young (EU) • EWA Information and Infrastructure Technologies, Inc. (US) • Fortify (US) • Global Security Mag (EU) • iDefense Labs (US) • iJET Intelligent Risk Systems (US) • Informatica (US) • IT – Information Sharing and Analysis Center (US) • iSIGHT Partners (US) • Lookingglass (US) • Multi-State Information Sharing Analysis Center (US) • nCircle (US) • SecureWorks (US) • Trend Micro (US) • United States Cyber Consequence Unit (US)

  16. Market Penetration • United States • Government market highly penetrated • Private sector emerging market with fast growth • European Union • Primary untapped and fragmented market

  17. Industry Best Practices • Service Pricing • Unavailable – gradual pricing • Products and Services • Training • Security Policy Engineering • Marketing Strategies • Strategic Alliances • Online Community Building • Industry Visibility

  18. Contact Information Henry Peltokangas(814) 823-3400hpeltokangas@gmail.comhpelto28@mercyhurst.eduJustin Smithjsmith16@mercyhurst.edujmsmith16@gmail.comJennifer Jarema(216) 316-1016jenniferjarema@gmail.comjjarem63@mercyhurst.edu Chris Dyakon(814) 392-9307chrisdyakon@gmail.comcdyako57@mercyhurst.eduAustin Ewing(814) 598-0035aewing56@gmail.comaewing56@mercyhurst.eduPerry Avery(330) 348-6916perry.avery@gmail.comCarolyn Venditti(717) 448-4693carolyn.venditti@gmail.com

More Related