Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Securing the Digital Frontier: An Analysis of C...

James Smith
September 18, 2023

Securing the Digital Frontier: An Analysis of Cybersecurity Landscape and Trends

Cyber threat analytics, cyber threat detection, and cybersecurity for data privacy & protection are the most common use cases across industries. Download the report to read about the regional hotspots, associated players, cybersecurity ecosystems, and more.

James Smith

September 18, 2023
Tweet

More Decks by James Smith

Other Decks in Technology

Transcript

  1. 1 Source: Draup 1 Report on Cybersecurity: Workload and Hiring

    Analysis An Analysis by Draup 19th May 2023 The document aims to provide the Industry Overview, Industry Ecosystem, Processes, Skills and Competencies, Cybersecurity Footprint, Outsourcing overview, and Key Industries Snapshot for Cybersecurity Analysis. CLICK HERE To access the full report
  2. 2 Use Case Cluster Solution Telecommunications Enterprise Software Insurance Hospital

    & Healthcare Professional Services Banking & Financial Services Consumer Electronics Aerospace Industrial Cyber Threat Analytics Cyber Threat Detection using AI Cyber Threat Analytics Cybersecurity for Connected Medical Devices Cyber Threat Analytics Cybersecurity for Data Privacy & Protection Cybersecurity for Consumer Electronics Devices Cybersecurity for Industrial Automation & Control Systems Cyber Threat Analytics Cyber Threat Detection using AI Cyber Threat Analytics Cybersecurity for Data Privacy & Protection Cyber Threat Analytics Cybersecurity for Data Privacy & Protection Cyber Threat Detection using AI Cyber Security Modernization Cyber Threat Analytics Cybersecurity for Industrial Automation & Control Systems Cybersecurity for Industrial Automation & Control Systems Cybersecurity for Data Privacy & Protection Cyber Security Modernization Cyber Threat Detection using AI Cyber Threat Detection using AI Cyber Threat Analytics Cyber Threat Detection using AI Cyber Threat Detection using AI Cyber Threat Prediction Cyber Security Modernization Cybersecurity for Industrial Automation & Control Systems Cyber Threat Detection using AI Cyber Security Modernization Cyber Assist App Cyber Security Modernization Cyber Threat Analytics Cyber Threat Prediction Cyber Threat Detection using AI Cyber Threat Prediction Cyber Assist App Cyber Threat Prediction Cyber Threat Prediction Cyber Threat Prediction Cybersecurity for Data Privacy & Protection Cybersecurity for Gaming Cybersecurity for Power Plant Automation & Control Systems Cybersecurity for Connected Medical Devices Cyber Threat Prediction Cybersecurity-related Usecases across Industries(1/3): Telecommunication, Enterprise Software, Insurance, and Hospital & Healthcare are the key industry in cybersecurity services Source: Draup Analysis, Draup Business Intentions. Note: Digital Use Cases captured are not exhaustive Low Medium High Intensity
  3. 3 Source: Newsroom And Press Release of HCL, Fortinet, Charter

    Communications, Security Bridge, and Palo Alto Cisco to provide a unified, AI-driven, cross- domain security platform, called Cisco’s new XDR solution with advanced features for Duo MFA to help organizations better protect the integrity of their entire IT ecosystem. Spectrum Enterprise, a part of Charter Communications, Inc., partnered with Cisco to provide Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect to its portfolio of cybersecurity products for secure access to information on private networks or public clouds. HCL Technologies partnered with Microsoft to combine HCL's cybersecurity fusion platform with Microsoft’s security products, like Azure Sentinel and Microsoft 365 E5, covering identity and access, information protection, and hybrid cloud infrastructure security for enterprises. DigiCert partnered with Oracle to provide DigiCert ONE, the platform for digital trust. Oracle Cloud Infrastructure (OCI) provides customers with a powerful combination of solutions to safeguard their data and secure their assets. SecurityBridge partnered with FortiGate to integrate the FortiGate solution for SAP, enabling an unprecedented, advanced level of security insight, speed, and protection. AI-Driven XDR Solution End-to-End Solution Cybersecurity Fusion Platform Data Security Solution Advanced Security Intelligent Cybersecurity Allianz partnered with Coalition to expand its cyber business for SME and mid-sized companies in key markets. Proactively monitoring and resolving cyber risks substantially helps customers protect their businesses and prevents financial losses. Cybersecurity for SME Health Insurance Cybersecurity Cyber-Risk Transfer Munich Re partners with Google Cloud and Allianz to bring market-leading cyber risk-transfer expertise with Google Cloud’s security know-how to address specific client needs. Cigna partnered with Shift Technology to evaluate Shift’s fraud detection solution Force to support its International Operations Unit, which manages international group health insurance, to strengthen its fraud detection capabilities within the claims process. NTT Ltd partnered with Palo Alto to bring together NTT Ltd.’s ‘Secure by Design’ services with Palo Alto Networks Prisma™ Access and Cortex™ XSOAR technologies and focus on the intelligent workplace, intelligent infrastructure, and intelligent cybersecurity. Partnership Inhouse Telecommunications Enterprise Software Insurance Industry Ecosystem (1/9): Telecommunication, Enterprise Software, and Insurance Industries focus on solutions like Intelligent Cybersecurity, Cybersecurity Fusion Platforms, and Insurance Cybersecurity
  4. 4 Application Security: Applications are connected across multiple networks, including

    the cloud, which leaves them open to all cloud threats and vulnerabilities, so application security is a tool to prevent cyberattacks Summary • Application security secures an application throughout its life cycle by three states that are building secure applications on secure workloads, securing applications during runtime, including access of applications to users & devices, and maintaining adaptative security on applications as they change and get updated. • Runtime Application Self-Protection (RASP) provides personalized application protections based on insight into internal data. • Static Application Security Testing (SAST) is a security testing method to analyze source code for vulnerability and Dynamic Application Security Testing (DAST) provides insight into how applications behave during production. • Web application security is the practice of protecting websites, applications, and APIs from attacks. It aims to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences. Web Application Security Features Cloud Native Application Security • Mobile application security focuses on the software security posture of mobile apps on Android, iOS, and Windows Phone platforms. It involves assessing applications for security issues in the contexts of the media they are designed to run on, the frameworks they are developed with, and the anticipated set of users. Mobile Application Security • Cloud-native application security is a cloud-first approach used to deploy applications securely at scale by embedding security into the software development lifecycle to detect vulnerabilities earlier with methodologies like shift left security strategies, zero-trust architecture, etc. Application security is a set of measures designed to prevent data or code at the application level from being stolen or manipulated. It involves security during application development, design phases, and systems and approaches that protect applications after deployment. Types Of Solutions Source: Various companies’ websites, Market Reports, Press & Media Releases.
  5. 5 Skills and Competencies Overview: Cyber Security Engineer, Cyber Security

    Analyst, and Information Security Analyst are the job roles in demand Source: Draup Outsourcing Module, updated in May 2023 Job Roles in Demand Core Skills Soft Skills Competencies Cyber Security Engineer • Cybersecurity • Network Security • Security Engineering • Cyber Defense • Crisis Management • Problem-Solving • Strategic Thinking • Methodical • Intrusion Detection, Product Security, Security Testing, Vulnerability Management, Threat and Risk Assessment, Cyber Threat Intelligence (CTI) • Created vulnerability assessment reports Cyber Security Analyst • Cyber Threat Intelligence (CTI) • Threat Modeling • Security Design • Security Operations Management • Security Controls • Critical Thinking • Learning Agility • Research Aptitude • Innovation • Analyze security vulnerabilities to notify the customers of Siemens Vilocify about software vulnerabilities at the earliest • In depth analysis and understanding of cyber breach through the analysis and correlating of security logs with the utilization of SIEM tools Information Security Analyst • Malware Analysis • Security Event and Incident Management (SEIM) • Information Security • Security Analysis • Managerial Aptitude • Analytical Thinking • Logical Reasoning • Strategic Thinking • Analysis of alerts generated by FireEye for Endpoints/Devices & taking necessary actions for blocking such malware callbacks at the network level • Malware Analysis of the alerts to identify the threat vector in order to recommend effective security controls Network Security Engineer • Network Security • Network Access Control (NAC) • Vulnerability Assessment • Intrusion Detection • Critical Thinking • Managerial Aptitude • Methodical • Analytical Thinking • Troubleshooting with the Network Data team for routing issues of the traffic • Responsible for securing infrastructure devices and data by using below technologies like Cisco ASA firewalls, Proxy - Zscaler, Bluecoat, Nipper tool, Antivirus - Symantec, and QualysGuard Information Security Engineer • Information Assurance Vulnerability • Malware Analysis • Security Monitoring • Vulnerability Management • Conceptualization • Logical Reasoning • Problem-Solving • Organizing • Establishing multiple programs without existing, including Governance and Compliance, Enterprise and Third-Party Risk, Security Operations, and Security Engineering • Developing and deploying processes and tooling to facilitate third- party risk operations and sending outbound questionnaires and performing risk assessments on Bonusly vendors
  6. 6 Globalization Footprint: Americas region dominates the cybersecurity global Technology

    workforce landscape Source: Draup Globalization Module, updated in May 2023 Note: The represented data illustrates the number of centers by Geography, and the bubble size is proportional to the overall HC Installed in the area. Global Footprint For Cybersecurity Americas EMEA APAC 8203K – 8204K Total Number of Technology workforce Installed ~960 Total Number of Technology Locations 3080K - 3090K 339 Key Locations • Paris Area, France • London, United Kingdom • Madrid Area, Spain • Munich Area, Germany • Amsterdam Area, Netherlands • Johannesburg, Gauteng, South Africa • Milan Area, Italy • Stockholm, Sweden • Stuttgart Area, Germany Key Locations • Bengaluru Area, India • National Capital Region, India • Pune Area, India • Chennai Area, India • Shanghai Area, China • Hyderabad Area, India • Beijing Area, China • Singapore • Tokyo, Japan • Sydney, Australia 2473K – 2474K 126 2640K – 2641K 495 Key Locations • San Francisco Bay Area, United States • Greater New York City Area, United States • Washington D.C. Metro Area, United States • Sao Paulo Area, Brazil • Greater Seattle Area, United States • Dallas/Fort Worth Area, United States Greater Boston Area, United States • Greater Los Angeles Area, United States • Toronto, Canada Area • Greater Chicago Area, United States • Greater Atlanta Area, United States 30% 38% 32% Technology Headcounts Number of Technology Locations
  7. 7 Americas Region Cybersecurity Footprint: San Francisco Bay Area, Greater

    New York City Area, and Washington D.C. Metro Area, United States, are the major MSA locations across the Americas region Source: Draup Globalization Module, updated in May 2023 Note: The represented data illustrates the number of centers by Geography. Key Focus Areas Associated Players Top MSA Locations across America Region Total Headcount: ~3089K Other ER&D MSA Locations Key Hotspots (Top 15 MSA Locations) Note: Key Hotspots are curated based on the headcount intensity Total Number of Locations: ~339 Greater Los Angeles Area, United States San Francisco Bay Area, United States Greater New York City Area, United States Greater Chicago Area, United States • The shift to virtualized IT environments, such as the infrastructure, data, and cloud computing network, led to many organizations facing cyberattacks due to the security vulnerability of remote work. North America is the dominant region in this market. Cloud Security is the fastest-developing market subsegment. • Key providers install advanced IT security solutions to protect sensitive information related to manufacturing operations while increasing productivity. Greater Boston Area, United States Greater Detroit Area, United States Sao Paulo Area, Brazil Dallas/Fort Worth Area, United States Greater Philadelphia Area, United States Toronto, Canada Area Greater Seattle Area, United States Washington D.C. Metro Area, United States Greater Atlanta Area, United States Houston, Texas Area, United States Greater Minneapolis-St. Paul Area, United States
  8. 8 Key Location Highlights: San Francisco Bay Area, United States,

    dominates Cybersecurity in Americas region Source: Draup Globalization Module Note: The Locations mentioned above are the key locations for smart home appliances in the Americas region; SOAR-Security Orchestration, Automation, and Response; SIEM- Security Information and Event Management Locations Headcount Key Companies Functional Workload Description San Francisco Bay Area, United States 259K - 260K • Cybersecurity • Artificial Intelligence & Data Science • Game Design & Development • Protect enterprise customers from cyber attacks, transforming their security operations with Chronicle SIEM / SOAR, BeyondCorp, Security Command Center, Security Foundation, and Mandiant Greater New York City Area, United States 245K - 246K • Cybersecurity • Cloud Computing • UI/UX Design • Implement frameworks for Operational Risk Appetite and Key Risk Indicators (KRIs), yielding a structured approach to the management, measurement, monitoring, governance, and control of technology and cybersecurity risks Washington D.C. Metro Area, United States 178K - 179K • Cybersecurity • Aerospace Testing & Simulation • Data Engineering • Leading the Client Cyber Tabletop Exercise team, delivering tabletop exercise scenarios to clients of the firm • Define and enforce cyber security policies and standards across the organization in support of operations and compliance Sao Paulo Area, Brazil 145K - 146K • Cybersecurity • Software Testing • Application Development & Maintenance • Implementation of effective risk management programs, execution and monitoring of technology risk and control processes as required • Support the documentation process of information risk control issues/gaps and the remediation plans, investigating and resolving control incidents Greater Seattle Area, United States 125K – 126K • Cybersecurity • Mobile Application Development • Manufacturing Engineering • Streamline and strengthen their security program across multiplatform, multi-cloud environments • Envisioning CISOs in the secure journey to the cloud and prioritizing quick wins in the fight against cyber adversaries, risks, and threats
  9. 9 Vendor Engagement: TCS, HCL, Wipro, Cognizant, and Infosys are

    the leading Cybersecurity services providers in Cybersecurity Outsourcing Market Source: Draup Outsourcing Module, updated in May 2023 Total Outsourcing Headcount 57K – 58K No. of Service Providers Analyzed ~789 No. of Clients Analyzed ~1375 Provider Locations Client Locations Key Client Locations • Bengaluru Area, India • Mumbai Area, India • National Capital Region, India • Pune Area, India • Hyderabad Area, India • Chennai Area, India • San Francisco Bay Area, United States • Greater New York City Area, United States Key Provider Locations • Bengaluru Area, India • Hyderabad Area, India • National Capital Region, India • Chennai Area, India • Pune Area, India • Mumbai Area, India • Kolkata Area, India • Paris Area, France • Madrid Area, Spain • Sao Paulo Area, Brazil Split by Industries Key OEM’s Key Service Providers 25% 3% 4% 4% 4% 4% 5% 5% 10% 12% 22% Others Consumer Software Food, Beverages & Consumer Goods Pharmaceutical Retail Energy & Utilities Insurance Automotive Enterprise Software Telecommunications Banking & Financial Services
  10. 10 Industries Snapshot(1/5): Banking & Financial Services Source: Draup Outsourcing

    Module, updated in May 2023 Top Service Providers Top Client MSA Top Provider MSA Key Workloads • Bengaluru Area, India • Mumbai Area, India • Bengaluru Area, India • Mumbai Area, India • Analysis of business requirements and implementing rules in Abinitio and AWS • Working with Design diagrams using Microsoft Visio • Chennai Area, India • Pune Area, India • Bengaluru Area, India • Hyderabad Area, India • Monitorization of P1, P2 and Incident tickets through Service Now • Analysis of Open and managed incidents using Service Now • Bengaluru Area, India • Pune Area, India • Bengaluru Area, India • Chennai Area, India • CBA risk management team in the investigation of data breach incidents • Performance of change management for DLP services • Singapore • Pune Area, India • Hyderabad Area, India • Pune Area, India • Along with SSP, SEAS, and ICC applications in all environments • Migration of all partners (Internal, External, VPN partners) from GIS • Mumbai Area, India • Greater Boston Area, United States • Bengaluru Area, India • National Capital Region, India • Administration and configuration of Web sphere Application Server WAS V8.5.5 and WAS V9.0 on Linux OS • Configuration of firewall rules and troubleshooting the issues Top Service Providers Engagement Snapshot Top Clients Top Client MSA Top Provider MSA Key Workloads • Chennai Area, India • Singapore • Hyderabad Area, India • Chennai Area, India • Able to handle all admin tasks on SIEM products • Reporting and troubleshooting of log sources not reporting to SIEM • Hyderabad Area, India • Pune Area, India • Pune Area, India • Hyderabad Area, India • Implementation of customer risk rating criteria with KYC management and procedure for both consumer and corporate customer • Pune Area, India • Mumbai Area, India • Bengaluru Area, India • Pune Area, India • Analysis of cyber security tech lead and handling a team which is responsible for supporting the access management of SAP systems • Mumbai Area, India • Mumbai Area, India • Hyderabad Area, India • Working with vendors to get Security Infrastructure to work smoothly • Loan eligibility Details will be provided by APIs • Mumbai Area, India • Mumbai Area, India • National Capital Region, India • Implementation and Configuration of Cisco 800/1900 Series Routers and routing protocols • Configuration of routers and switches for backup Top Clients Engagement Snapshot Key Service Providers Key Clients Total Number of Clients Analyzed ~240 Total Number of Service Provider Analyzed ~265 Workforce analyzed ~13K-14K