Professional Documents
Culture Documents
Data Security
Startups, emerging technologies, and Big Tech’s
innovations on the cutting edge of data security
1
WHO WE ARE
2
TRUSTED BY THE WORLD’S LEADING COMPANIES
3
TRANSFORM draws on the experience
of successful executives from today's
JOIN US ON DEC.
top companies and the latest research 4 & 5 IN NYC
on technology, growth and innovation
to cut through the fog about the coming RSVP TODAY
digital revolution.
4
Contents
8 Data security rising
12 Startup landscape
22 Emerging technologies
5
Suddenly, everyone’s focused on cybersecurity
66
Talk of “data security” is especially on the rise
Quarterly news mentions of “data security,” 2014 – Q3 2018
7
8
Cybersecurity is now top of mind for the C-suite
Quarterly mentions of “cybersecurity” on corporate earnings calls, 2014 – Q3 2018
9
Startups are rising to the challenge
30+ startups helping enterprises protect data:
1010
The holy grail of enterprise data security
Homomorphic encryption could transform cybersecurity
1111
Spotlight: homomorphic encryption secures data in use
The enterprise data life cycle consists of three elements: data at rest, data in transit, and data in use.
Traditional encryption
techniques secure data while it
is at rest and in transit, but fail
to secure data in use.
Homomorphic encryption
addresses that critical
vulnerability.
Homomorphic encryption is
creating new opportunities for
secure internet processes.
Startups and corporates alike
are leveraging it for private
database comparison, search,
cloud computing, and to
prevent future cyberattacks.
1212
Tracking data on enterprise networks
Security systems for tracking the origin, interactions, and movement of data over time
1313
Anonymizing personally identifiable info (PII)
Making it harder — or even impossible — to identify an individual in a data set
1414
The future of data security is quantum
Encryption products that can withstand quantum computer attacks
Companies include
CryptoMove, which fragments,
encrypts, and mutates data to
make it unrecognizable to
hackers.
1616
Outsourcing data security
Taking data security liability off the shoulders of enterprises
1717
Data security’s secure and immutable ledger
Blockchain technology to manage the flow of data in enterprise systems
1818
AI, blockchain, & enhanced encryption are the
future of enterprise data security
19
AI, blockchain, encryption, and the CIA triad
Data security strategies can be assessed through a concept known as the CIA triad
21
Facebook,
Facebook, Amazon, Microsoft, Google, Apple
Amazon,
data security patent application activity, 2013 - 2017
Microsoft,
Google, and
Apple are
doubling down
on data security.
22
FACEBOOK, APPLE, AND GOOGLE – SECURELY SHARING IDENTITY DATA
Facebook and Google track users online and sell that data to advertisers. In turn, these
companies are trying to find new ways to target users (and increase their bottom line) while
protecting users’ privacy. Similarly, Apple is making a foray into advertising with an eye on
maintaining its reputation as a privacy leader.
Facebook applied for the Apple filed a patent to Google published a patent
patent “Anonymizing User “repackage media content for “access control for user
Identifiable Information” in data with anonymous related data” in May’18.
Jan’18. identifiers” in Dec’17.
23
MICROSOFT – SECURING DATA IN USE
Microsoft filed a patent application as early as 2013 (granted in 2016) for “encrypting genomic data for
storage and genomic computations.”
24
GOOGLE AND AMAZON – DATA SECURITY IN THE CLOUD
Recent high-profile data exposures — including at Accenture, WWE, and Booz Allen — stem
from misconfigurations in Amazon Web Services’ Simple Storage Service (S3) buckets.
Google’s cloud customers have also suffered data leaks as well due to holes in cloud
infrastructure security.
25
WHERE IS ALL THIS DATA FROM?
26
cbinsights.com
@cbinsights
waltman@cbinsights.com
27