GreyLogicCyber Intelligence Market and Competitor Research13 November 2009
RequirementsWho are the potential customers for a weekly newsletter  summarizing and analyzing trends in various cyber threats and for tailored intelligence briefings in the United States (US) and the European Union (EU)?Who are GreyLogic’s competitors and how deep is the market penetrated by them?What are the “best practices” among companies providing timely intelligence to private and government clients in the US and the EU?Competitors' services' pricing structure from a starting company to a mature business.What types of products and services do these companies provide?What is the companies' marketing strategy?2
AgendaKey FindingsCustomersGovernment
Private Sector
AcademiaCompetitorsMarket Penetration
Best Practices
Service Pricing
Products and Services
Marketing Strategies3
Key FindingsTop 12 Customers1. Cyber Security Management Center (CSMC) (US)2. Defense Information Systems Agency (DISA) (US)3. Department of Energy (DOE) (US)4. Department of State (US)5. United States Postal Service (USPS) (US)6. National Aeronautics and Space Administration (NASA) (US)7. Ebay (US)8. Western Union (US)9. Arsys (EU)10. Facebook (US)11. LiveJournal (US)12. Twitter (US)4
Key Findings The best markets for a weekly cyber intelligence brief are likely:Large US government agencies and secondly large private companies with,Cyber or national security missionsServices provided through ITEuropean market highly fragmentedDiversity – numerous separate marketsBest markets within EU: UK and countries in Russia’s sphere of influence, such as Estonia and Poland5
Key Findings 51 Total OrganizationsGovernment : 17Private Sector: 23Academia: 11United States: 35European Union: 16Source: Created by analyst6
Customers - Government9 out of 17 victims of cyber attack
 7 out of those 9 were US government agencies
14 out of 17 are high or moderately high-value targets
 Disruption would have symbolic, financial, political, or tactical consequences
 Critical Infrastructure and Key Resources (CIKR) sectors7
Customers - Government 12 out of 17 have IT- or national security centric missions
 i.e. Cyber Security Management Center, Defense Information Systems Agency 9 out of 17 rely on private companies or Information Sharing and Analysis Centers (ISACs) for cyber security services8
Customers - GovernmentTop Five Government CustomersCyber Security Management Center (CSMC)Defense Information Systems Agency (DISA)Department of Energy (DOE)Department of State (DOS)United States Postal Service (USPS)9
Department of StateContact Information:Susan Swart, Chief Information Officer, Phone: 202-647-2889Charles D. Wisecarver, Deputy Chief Information Officer, 202-647-2863Robert K. Nowak, Director of IT Infrastructure, 202-647-1001John Streufert, Director of Information Assurance, 703-812-2500Cheryl Hess, Director of Information Security Programs for the Bureau of Diplomatic Security, 571-345-3080Organizational structure of Dept. of State contact persons. Source: Created by analyst10

Grey Logic

  • 1.
    GreyLogicCyber Intelligence Marketand Competitor Research13 November 2009
  • 2.
    RequirementsWho are thepotential customers for a weekly newsletter summarizing and analyzing trends in various cyber threats and for tailored intelligence briefings in the United States (US) and the European Union (EU)?Who are GreyLogic’s competitors and how deep is the market penetrated by them?What are the “best practices” among companies providing timely intelligence to private and government clients in the US and the EU?Competitors' services' pricing structure from a starting company to a mature business.What types of products and services do these companies provide?What is the companies' marketing strategy?2
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
    Key FindingsTop 12Customers1. Cyber Security Management Center (CSMC) (US)2. Defense Information Systems Agency (DISA) (US)3. Department of Energy (DOE) (US)4. Department of State (US)5. United States Postal Service (USPS) (US)6. National Aeronautics and Space Administration (NASA) (US)7. Ebay (US)8. Western Union (US)9. Arsys (EU)10. Facebook (US)11. LiveJournal (US)12. Twitter (US)4
  • 11.
    Key Findings Thebest markets for a weekly cyber intelligence brief are likely:Large US government agencies and secondly large private companies with,Cyber or national security missionsServices provided through ITEuropean market highly fragmentedDiversity – numerous separate marketsBest markets within EU: UK and countries in Russia’s sphere of influence, such as Estonia and Poland5
  • 12.
    Key Findings 51Total OrganizationsGovernment : 17Private Sector: 23Academia: 11United States: 35European Union: 16Source: Created by analyst6
  • 13.
    Customers - Government9out of 17 victims of cyber attack
  • 14.
    7 outof those 9 were US government agencies
  • 15.
    14 out of17 are high or moderately high-value targets
  • 16.
    Disruption wouldhave symbolic, financial, political, or tactical consequences
  • 17.
    Critical Infrastructureand Key Resources (CIKR) sectors7
  • 18.
    Customers - Government12 out of 17 have IT- or national security centric missions
  • 19.
    i.e. CyberSecurity Management Center, Defense Information Systems Agency 9 out of 17 rely on private companies or Information Sharing and Analysis Centers (ISACs) for cyber security services8
  • 20.
    Customers - GovernmentTopFive Government CustomersCyber Security Management Center (CSMC)Defense Information Systems Agency (DISA)Department of Energy (DOE)Department of State (DOS)United States Postal Service (USPS)9
  • 21.
    Department of StateContactInformation:Susan Swart, Chief Information Officer, Phone: 202-647-2889Charles D. Wisecarver, Deputy Chief Information Officer, 202-647-2863Robert K. Nowak, Director of IT Infrastructure, 202-647-1001John Streufert, Director of Information Assurance, 703-812-2500Cheryl Hess, Director of Information Security Programs for the Bureau of Diplomatic Security, 571-345-3080Organizational structure of Dept. of State contact persons. Source: Created by analyst10

Editor's Notes

  • #6 The size of the company was identified to be an important factor because…More funding – resources to utilize such servicesDesignated team/unit for cyber security and related topics and executive level to consume intelligence85 percent of small and medium businesses do not have a staff dedicated to IT security72 percent do not have formal internet security policiesNo staff, no time, no perceived need…GovernmentTop 5 potential customers were all governmentAccustomed intelligence consumerIs likely to have the executive level at which to consume intelligence, and designated team for IT securityPrivate businessesAre aware of their cyber security needs - mission is IT dependent: eBay, Facebook, Twitter
  • #8 9 out of 17 government agencies have been attacked CSMC (Dept. of Transportation), DISA, DOE, Dept. of State, USPS, NASA, FBI, Staff Department of Intelligence and Security, French Networks and Information Security Agency (FNISA) 7 of those 9 were US government 14 out of 17 government agencies are the highest value targets, all are US agencies CSMC, DISA, DOE, Dept. of State, USPS, FBI, HHS (high, 3 out of 3) NASA, FNISA, NTIA, Staff Department of Intelligence and Security, Federal Criminal Police Office, ITA, Netherlands Military Intelligence and Security (moderately high, 2 out of 3)
  • #9 12 out of 17 government agencies have IT- or national security-centric missionsCSMC, DISA, DOE, Dept. of State, FBI, FNISA, NTIA, Staff Department of Intelligence and Security, Netherlands Military Intelligence and Security, UK Cyber Security Operations Center, Brigade of Technological Research, European Network and Information Security Agency (ENSIA) 9 out of 17 government agencies rely on private companies or ISACs for cyber security services CSMC, DISA, DOE, Dept. of State, USPS, NASA, HHS, NTIA, ITA
  • #11 Because the State Department is so large, there are multiple individuals that have IT security roles. Their places in the overall structure of the State Department are shown in the chart.