• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Sponsored Post
    • Make a Contribution
    • Technology Job Posting
  • Technology Events 2022-2023
  • Technology Domains
  • Technology Markets
  • Venture Capital
  • Contact
    • About

Cybertech 2016: Highlights and Key Takeouts

January 29, 2017 By Technologies.org Leave a Comment

The Prime Minister of Israel Benjamin Netanyahu: “Israel is one of the five global cybersecurity superpowers and moving to become #1”.

the Prime Minister of Israel Benjamin Netanyahu

Yuval Steinitz, member of the Knesset and Minister of National Infrastructure, Energy and Water Resources: “As we speak now the Israel Electric Authority has been hit by cyberattack”.

Yuval Steinitz National Infrastructure Minister of Israel

Action, creativity, entrepreneurship and enthusiasm are undeniably here.

Cybertech Expo

Key takeaways:

  • There are currently about 400 cybersecurity companies in Israel. According to a report of the Israel Venture Capital (IVC) Research Center the Israeli cyber security companies raised a record $540 million in 2015, up 20 percent from a year earlier. 18 Israeli companies were also acquired last year for a total of $1.2 Bln. The average cyber exit in the past five years stood at $78 million. IVC forecasts growth to continue in 2016.
  • Estonia is moving fast to become all digital government: e-residence program, unified digital medical records database, e-elections.
  • Netaniahu: “International cybersecurity standards do not work for us. It’s every government for itself when it comes to cybersecurity though we do our best to cooperate with our allies.” Loose quote.
  • Built-in vs. bolt-on solutions. SOCs are on rise but SOCs are expensive. Only 1% of companies can afford SOCs. Large vendors are proponents of integrated approach. Small vendors argue that point solutions can significantly reduce risk at fraction of cost.
  • IT security budgets increased from 4% to 14-15% of IT budget. This trend can’t go on forever. Bottomline and productivity remain the main objectives of business, not cybersecurity. Cost-effective cybersecurity is the name of the game for years to come. “Balance of productivity and cybersecurity, cost-effective cybersecurity”, Nadav Zafrir, Former Commander of Unit 8200 (Israeli version of NSA).
  • Deception networks, moving target approach are cost-effective cybersecurity technologies with high growth potential. HP Enterprise and TrapX security offer deception grids, Morphisec offers moving target defense.
  • “Notion of perimeter security has been obliterated. It’s all about identity. 90% of attackers just walked in.” Zulfikar Ramzan, CTO RSA
  • IoT: What about security of things? No clear concepts. No plan survives contact with the enemy. We’ll figure out how to secure IoT in the course of battle. A lot of blubbering “Will an internet-enabled toaster-oven attack an internet-enabled fridge? Will they conspire to become an army of bots?”
  • According to a recent market study Apache Spark Market Forecast 2017-2020 the cybersecurity log analysis is the fastest growing segment of the Apache Spark market, likely to double by 2020.

Commonalities:

  • Very low signal-to-noise ratio, too many banalities mixed with Israeli boasting and chest-beating – “we are cybersecurity superpower, we are startup nation”. A lot of retired generals turned politicians and administrators who hardly know how to use computer yet preaching vigorously “cyber” slogans and mantras.
  • Almost every presentation begins with “lines between physical and digital domains blurred”.
  • Almost every presentation finishes with “we make world a safer place” message.
  • Racket message “either you pay for better protection today, or helplessly watch how your systems will be disrupted tomorrow”.

Funny bit: Cyberbit evokes images of Bonnie and Clyde to illustrate its cybersecurity concept (cyber criminals targeting small entities, importance of threat mapping).

Cyberbit evokes images of Bonnie and Clyde to illustrate its cybersecurity concept

  • Browser as a Service Market
  • Deception Cybersecurity Market Analysis
  • Federal IT Modernization
  • U.S. Federal Cybersecurity Market Research
  • U.S. Federal IT Business Continuity and Disaster Recovery Market Forecast
  • Deep Packet Inspection (DPI): U.S. Government Market Forecast
  • Quantum Computing Market Forecast
  • U.S.-Mexico Border Security & Protection Market
  • U.S. IT Business Continuity and Disaster Recovery Market

Related

Filed Under: Tech Tagged With: cybersecurity

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Market Research

ResilientSupplies.com: Resilient Supplies, the Name of the Game for the Global Supply Chain
How do marketers collect data?
ESGFT.com (ESG Fungible Tokens): Companies are doubling down on ESG
HashtagSmartphone.com (#Smartphone): How smart assistants will synchronize your life
OpInt.com (Operational Intelligence): Tailored project delivery intelligence reduces risk
Venture Capital Digest
MoscowRules.com (Moscow Rules): A Perfect Title for Publication Covering Russian Affairs

Market Analysis

Semiconductor revenue grew 25.1% in 2021, exceeding $500 billion for the first time
DeFiRetailing.com (DeFi Retailing): DeFi will change retail as we know it
Regulation can disrupt the meat industry
Revenue from NFTs could exceed $130 billion by 2030
China wants to produce its own hard-­tech companies in order to become less reliant on the hostile West
The U.S. Army’s Long-Range Hypersonic Weapon (LRHW)
Up to $265 billion From Hospital to Home

Tech Events

Fira de Barcelona celebrates the extension of MWC Barcelona until 2030
Jamstack Conf 2022, November 7-8 2022, San Francisco and online
Photonics Industry Summit, September 21, 2022, Washington, DC

Secondary Sidebar

Venture Capital

Uiflow Secures $5.2 Million in Seed Round to Accelerate Use of No-Code Platform for Enterprises
Strapi Secures $31 Million in Series B Funding to Further Develop Open Source Headless Content Management System and Deliver Cloud Platform
Sharebite, the Leading Food Benefits Platform, Announces Closing of $39 Million Series B Round
Elicit Plant Raises €16M to Accelerate R&D and Marketing of Its Natural Solution Dedicated to the Reduction of Water Consumption by Plants in Agriculture
Plant Genetics Company NuCicer Closes Oversubscribed $4.5M Series Seed Round to Bring Ultra-High Protein Chickpeas to Market
Danish CleanTech ZeroNorth Raises Over $50 Million Series B Round to Help Decarbonise Shipping
Eurora raises $40M for its AI-based system to automate EU e-commerce shipping compliance
Foundational Skills Checklist
Taptap Send raises $65M to build cross-border remittances
Renesas Announces Investment in Popular Open-Source Company Arduino to Access Huge Developer Community

Footer

Recent Posts

  • Oracle Becomes First Hyperscaler to Open a Cloud Region in Mexico
  • Ceres and Shell announce electrolyser agreement for green hydrogen
  • Datadog Launches Audit Trail to Help Businesses Achieve Their Compliance and Governance Objectives
  • Samsung Unveils ISOCELL Image Sensor with Industry’s Smallest 0.56μm Pixel
  • Box Launches Technology Collaboration with FUJIFILM Business Innovation
  • VivaTech, Europe’s number one startup and tech event, makes its big comeback with more than 91,000 participants in Paris
  • Cloudflare Expands Its Zero Trust Platform to Become the Only Cloud-Native Provider with Network Scale
  • New Zealand’s leading port, Ports of Auckland, welcome the world’s first full sized, electric tugboat
  • Energy Dome Successfully Launches First CO2 Battery Long-Duration Energy Storage Plant in the World
  • Resilience Announces $625 Million Series D Financing to Expand Network, Bring Innovative Technologies to Biomanufacturing

Media Partners

  • VPNW
  • S3H
  • OPINT
  • Press Media Release
  • OSINT
  • Digital Market
  • Briefly

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Opinion
  • Venture Capital

Copyright © 2015 Technologies.org

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT