Cybersecurity Professional Services Report Q3 2015

Cybersecurity Professional Services Report

A SPECIAL REPORT FROM THE EDITORS AT CYBERSECURITY VENTURES

Q3 2015

The Cybersecurity Professional Services Report provides cybersecurity services trends, statistics, best practices, and resources for chief information security officers (CISOs) and IT security staff.

PROFESSIONAL SERVICES

A new breed of pure-play cybersecurity professional services firms emerges

Sponsored by root9B, provider of the The Adversary Pursuit Center (APC) – a manned information security operations center, providing clients 24/7/365 remote computer network defense

  • Deloitte recently stated the market for information security consulting grew by 8.1 percent to $15.3 billion in 2014, from $14.2 billion in 2013, citing Gartner research that analyzes and publishes its market share and rankings for the previous calendar year across all security-related capabilities.
  • Gartner has stated that by 2018, more than half of organizations will use security services firms that specialize in data protection, security risk management and security infrastructure management to enhance their security postures.
  • In an interview recorded at the 2015 RSA Conference, Cisco Security Services SVP Bryan Palma told SearchSecurity “If you look at what’s happening in the services market, it grows twice as fast as the security product market. It’s bigger than the security product market.”
  • According to research from International Data Corporation (IDC), worldwide threat intelligence security services (TISS) spending will increase from $905.5 million in 2014 to more than $1.4 billion in 2018. The TISS market is made up of several distinct facets, including data feeds and publications, consulting security services, and managed security services (MSS). IDC has expanded its definition of the intelligence security services market to include what it calls iterative intelligence. This iterative process learns from past experiences and mistakes, and incorporates this new knowledge at a more rapid pace, which often results in better long-term solutions.

MANNED INFORMATION SECURITY – We send specialized cyber operators into your network to hunt for and stop the intruders your existing solutions are no match for

  • The “2015 PwC US State of Cybercrime Survey” asked whether organizations have the expertise to address cyber-risks associated with implementation of new technologies, only 26 percent said they have capable personnel on staff. Most rely on a combination of internal and external expertise to address cyber-risks of new solutions.
  • “We expect to see a new breed of cybersecurity professional services firms emerge over the next two years, driven by rising cybercrime, new types of cyber-threats, and a severe cybersecurity labor shortage” says Steve Morgan, Editor-In-Chief of the Cybersecurity Market Report. “We anticipate new entrants around micro-specializations in fields like proactive adversarial pursuit services and other niches. The companies who are first to market in these categories have an opportunity to differentiate themselves and win big contracts during the early stages of market development. First movers will even define some of the cybersecurity specialty service market categories.”
  • “The average network compromise goes undetected for more than 200 days” says Eric Hipkins, CEO of root9B. “The cyber threat requires a proactive manned information security solution, providing superiorly trained and equipped defenders to focus on active defense and adversary pursuit” adds Hipkins.

Join the Cybersecurity Ventures Newsletter to stay on the cutting edge.

grayfooterline

stevemorgan31CYBERSECURITY VENTURES

Steven C. Morgan, Editor-In-Chief

Steve Morgan

    is Founder and CEO at Cybersecurity Ventures, and Editor-In-Chief of the Cybersecurity Market Report and the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies. Steve writes the weekly Cybersecurity Business Report for IDG’s CSO, and he is a contributing writer for several business, technology, and cybersecurity media properties.

© 2015 Cybersecurity Ventures. All rights reserved. Federal copyright law prohibits unauthorized reproduction of this Report by any means and imposes fines up to $150,000 for violations. Reproduction in whole or in part in any form or medium without expressed written permission of Cybersecurity Ventures is prohibited.


root9bbanner