=Paper= {{Paper |id=Vol-3188/short6 |storemode=property |title=Cybersecurity Startup Investments (short paper) |pdfUrl=https://ceur-ws.org/Vol-3188/short6.pdf |volume=Vol-3188 |authors=Tetiana Moiseienko,Anastasiia Kiva |dblpUrl=https://dblp.org/rec/conf/cpits/MoiseienkoK21 }} ==Cybersecurity Startup Investments (short paper)== https://ceur-ws.org/Vol-3188/short6.pdf
Cybersecurity Startup Investments
Tetiana Moiseienko1 and Anastasiia Kiva1
1
 National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute,” 37 Peremohy ave., Kyiv,
03056, Ukraine

                 Abstract
                 The rapid growth of computer systems in different industries, such as financial systems,
                 industrial equipment, aviation, consumer devices, government and others, means that there is
                 an increasing number of systems at risk. Cybersecurity is important because it protects all
                 categories of data from theft and damage. This includes sensitive data, personally identifiable
                 information, protected health information, personal information, intellectual property, data,
                 and governmental and industry information systems. This paper examines roles of startups in
                 cybersecurity systems in different industries. Cybersecurity products, services and
                 professionals have never been in higher demand. A contributing factor to the cybersecurity
                 skills gap is the large number of security startups that have been founded in recent years.

                 Keywords1
                 Computer systems, cybersecurity, cybersecurity market, startup.

1. Introduction

    The pandemic has had a major impact on cybersecurity. Cybercrimes now cost the world nearly
$600 billion each year, according to Mordor Intelligence - equivalent to nearly 0.8% of the global GDP.
Meanwhile, the World Economic Forum reports that the likelihood of identifying and prosecuting the
perpetrators of cyberattacks in the U.S. has fallen to a dismal 0.05% [1].
    According to a research report “Cybersecurity Market with Covid-19 Impact Analysis by
Component (Software, Hardware, and Services), Software (IAM, Encryption, APT, Firewall), Security
Type, Deployment Mode, Organization Size, Vertical, and Region—Global Forecast to 2026”
published by MarketsandMarkets, In the post-COVID-19 scenario, the global cybersecurity market size
is projected to grow from USD 217.9 Billion in 2021 to USD 345.4 Billion by 2026, recording a
Compound Annual Growth Rate (CAGR) of 9.7% from 2021 to 2026. The market’s growth can be
attributed to the increasing awareness and rising investments in cybersecurity infrastructure across
global organizations operating across verticals [2].
    Amidst the COVID-19 pandemic crisis, various governments and regulatory authorities mandate
both public and private organizations to embrace new practices for working remotely and maintaining
social distancing. Since then, the digital ways of doing business became the new Business Continuity
Plan (BCP) for various organizations. With the widespread use of BYOD devices, and internet
penetration across the corners of the globe, individuals are progressively inclined towards the use of
digital technologies such as cloud solutions, driving the need for cybersecurity measures for protection
against cyber-attacks. There is growth in the need for endpoint and Virtual Private Network (VPN)
security measures and rising demand for cyber hygiene practices to ensure robust security policies and
practices amid Covid-19 pandemic [3].




CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, October 26, 2021, Kyiv, Ukraine
EMAIL: t.e.moiseenko@gmail.com (T. Moiseienko); kiva.anastassia@gmail.com (A. Kiva)
ORCID: 0000-0002-2074-8062 (T. Moiseienko); 0000-0002-6610-5898 (A. Kiva)
              ©️ 2022 Copyright for this paper by its authors.
              Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
              CEUR Workshop Proceedings (CEUR-WS.org)



                                                                                244
2. Cybersecurity Definition and Impact
    Cybersecurity is part of the information security of any organization. Since the outbreak of the
COVID-19 pandemic, organizations around the world have sent their employees to their home office
for work. This decentralization of the organization's IT landscape has created new vulnerabilities for
malicious actors to use, which is consistent with the observations of IT professionals that the number
of cyberattacks is increasing after the COVID-19 pandemic. As a result, cybersecurity remains a priority
among business leaders to ensure the company’s performance and data security.
    There are several definitions of “cybersecurity,” but they are quite similar.
    According to Glossary of Key Information Security Terms by National Institute of Standards and
Technology (NIST) cybersecurity or computer security it is measures and controls that ensure
confidentiality, integrity, and availability of information system assets including hardware, software,
firmware, and information being processed, stored, and communicated [3].
    According to Cybersecurity and Infrastructure Security Agency cybersecurity is the art of protecting
networks, devices, and data from unauthorized access or criminal use and the practice of ensuring
confidentiality, integrity, and availability of information [4].
    The Law of Ukraine “On Basic Principles of Ensuring Cyber Security of Ukraine” defines the
following [5]:
     1. Cybersecurity is the protection of vital interests of man and citizen, society and the state during
        the use of cyberspace, which ensures the sustainable development of the information society
        and digital communication environment, timely detection, prevention and neutralization of real
        and potential threats to Ukraine's national security in cyberspace.
     2. Cybersecurity is important because it protects all categories of data from theft and damage. This
        includes sensitive data, personally identifiable information, protected health information,
        personal information, intellectual property, data, and governmental and industry information
        systems.
    We can resume that cybersecurity is related to criminal attacks such as unauthorized access from the
inside or outside of an organization. It is the framework of protecting and securing anything that is
vulnerable to hacks, attacks, or unauthorized access which mainly consists of computers, devices,
networks, servers, and programs.
    Cybersecurity is important because government, military, corporate, financial, and medical
organizations collect, process, and store unprecedented amounts of data on computers and other devices.
Much of this data may be confidential information, whether intellectual property, financial data,
personal information or other types of data, for which unauthorized access or disclosure may have
negative consequences. Organizations transmit sensitive data over networks and other devices in the
course of doing business. Companies and organizations, especially those tasked with protecting
information related to national security, health care or financial records, need to take steps to protect
their confidential business and personnel information.
    The growth in the number of computer systems and the increasing reliance upon them by individuals,
businesses, industries, and governments means that there is an increasing number of systems at risk
(Table 1).




                                                   245
Table 1
Type of industries under the cybersecurity risk
         Industry at risk                                      Type of risk
        Financial systems          The computer systems of financial regulators and financial
                                   institutions like the National Bank of Ukraine, National
                                   Commission on Securities and Stock Market, Ministry of Finance
                                   of Ukraine and Physical Deposit Guarantee Fund, investment
                                   banks, and commercial banks are prominent hacking targets for
                                   cybercriminals interested in manipulating markets and making
                                   illegal possessions. Websites and apps that accept or store
                                   credit card numbers, brokerage or intermediary accounts, and
                                   bank account information are also remarkable hacking targets,
                                   because of the potential for immediate financial gain from
                                   transferring money, shopping, or selling the information on the
                                   black market.
      Utilities and industrial     Computer management functions in many utilities, including
             equipment             coordination of telecommunications, power grids, nuclear
                                   power plants, opening and closing valves in water and gas
                                   networks.
             Aviation              The aviation industry is highly dependent on a number of
                                   complex systems that can be attacked [6]. A simple power
                                   outage at one airport can have consequences around the world,
                                   much of the system relies on radio transmissions that can be
                                   disrupted, and aircraft control of the oceans is particularly
                                   dangerous because radar surveillance extends only 175-225
                                   miles from shore. There is also the potential for an attack by an
                                   aircraft.
        Consumer devices           Desktops and laptops are usually used to collect passwords or
                                   financial account information or to create a botnet to attack
                                   another target. Smartphones, tablets, smartwatches, and other
                                   mobile devices, such as quantified stand-alone devices such as
                                   activity trackers, have sensors such as cameras, microphones,
                                   GPS receivers, compasses, and accelerometers that can be
                                   used, and they can collect personal information, including
                                   sensitive health information. Wi-Fi, Bluetooth, and cell phone
                                   networks on any of these devices can be used as attack vectors,
                                   and sensors can be remotely activated after a successful
                                   violation [7].
       Large corporations          Large corporations are a common goal. In many cases, attacks
                                   are aimed at obtaining financial gain by stealing personal data
                                   and involve data breaches. This could be even medical records
                                   theft or health insurance fraud.
           Automobiles             Cars are becoming increasingly computerized: many models
                                   feature engine synchronization, cruise control, anti-lock brakes,
                                   seat belt pretensioners, door locks, airbags and advanced driver


                                                  246
                                    assistance systems. In addition, connected cars can use Wi-Fi
                                    and Bluetooth to communicate with on-board consumer
                                    devices and the mobile phone network. Self-driving cars are
                                    expected to be even more complex. All of these systems carry
                                    some security risk, and such issues have attracted attention [8].
           Government               Government and military computer systems are commonly
                                    attacked by foreign powers. Local and regional government
                                    infrastructure, such as traffic light management, police and
                                    intelligence communications, personnel records, student
                                    records, and financial systems, are also potential targets, as
                                    they are all now largely computerized.
          Energy sector             In distributed generation systems, the risk of a cyber-attack is
                                    real. An attack could cause a loss of power in a large area for a
                                    long period of time, and such an attack could have just as
                                    severe consequences as a natural disaster.


3. Cybersecurity startup investments
   In the modern information age when more and more things are getting connected, cybersecurity
becomes an ever-relevant topic.
   The statistic shows the size of the industrial cybersecurity hardware, software, and services market
worldwide, in 2017 and 2022 forecast (Fig. 1). Analyzing the cybersecurity services industry market
size chart, we can summarize that it has increased steadily since 2017, reaching a value of approximately
$188 billion in 2020. Despite the economic effects of the coronavirus (COVID-19), the industry is
expected to increase by 11 percent in 2021.




Figure 1: Size of the cybersecurity market worldwide, from 2017 to 2022 (in billion U.S.
dollars) [9]

   The pandemic has had a major impact on cybersecurity. Cybercrimes now cost the world nearly
$600 billion each year, that’s perhaps why venture capital (VC) funding in cybersecurity more than
doubled year-over-year during the first half of 2021, while the total number of mergers and acquisitions
(M&A) in the sector more than quadrupled. A new report from AllegisCyber Capital, Momentum
Cyber, and NightDragon finds that investors poured $11.5 billion in total VC financing in H1 2021, up




                                                  247
from $4.7 billion in H1 2020, and that M&As jumped from $9.8 billion across 93 transactions to $39.5
billion across 163 transactions during the same period [1].
    PwC and CB Insights’ Q3 2020 MoneyTree report highlights the latest trends in venture capital
funding globally. ICT in different forms (SW, HW, telecommunication) fully dominates the US VC
industry. Monitoring and security deals grew more than double in Q3’20 (Fig. 2). According to a joint
study by CBInsights and PwC, Cybersecurity startups received over $10.7 billion in funding in 2020
(Fig. 3).




Figure 2: Top 10 US verticals by deal activity [10]




Figure 3: Top 10 US verticals by investments [10]

    Overall cybercrime costs are expected to reach $10.5 trillion annually by 2025, up from $3 trillion
in 2015, according to Cybersecurity Ventures. As a result, security is expected to more than double in
size to $300 billion by 2025 [11].
    As attack methodologies evolve due to AI, machine learning and nation-state hackers, security
startups are receiving a lot of funding to develop products that can secure application access for remote
workers, provide real-time visibility into cyber attacks and protect data as it travels from the cloud to
IoT devices. In this article, we’ll cover the top cybersecurity startups to watch in 2021 [11].
    New startups and well-known suppliers are attracting record levels of investment as all organizations
seek to thwart the growth of complex, costly and unpredictable cyberattacks. The Cybersecurity
Ventures report estimates that the total cost of cybercrime will be $10.5 trillion by 2025. While attack
methodologies continue to evolve with new technologies such as artificial intelligence, machine
learning, cloud computing, etc., cybersecurity novices are also embracing them to find the exit door.
    Here are the areas of cybersecurity that are currently the most promising in our opinion:



                                                  248
    ●   Data protection. A data breach can cost a business million and even lead to bankruptcy.
        According to IBM, the average damage from data breaches is estimated at $3.62 million. And
        given the fact that the ingenuity of crackers and, accordingly, the frequency of hacking
        increases, products that solve problems in this area will be in great demand.
    ● Global business digitalization and privacy assurance. Whether a company uses a private server
        or a cloud platform to run its business, most businesses require security protocols to keep
        communications, data transfers, and so on, confidential. The deeper the business goes to the
        Internet, the more the need for cybersecurity solutions will grow.
    ● Working with Big Data. It is relevant both for business and for the public sector, urban
        infrastructure. Attacks on such systems are fraught not only with financial losses, government
        threats, but also with the actual paralysis of all life.
    ● Phishing and propaganda. The emergence and continuous development of the virtual space
        gives people many new opportunities—for communication, work, education and recreation. At
        the same time, cybercriminals have also found their niche and are successfully using it: cyber
        espionage, cyberattacks, propaganda of extremist ideas and movements are only part of the
        crimes committed using technologies, the number and variety of which is increasing every year.
        The creation of new methods of counteraction and combating all this is more urgent than ever,
        and needs an innovative approach.
    The advantage of startups over industry giants is flexibility, responsiveness, and relatively modest
product development budgets. Thanks to this, they have every chance to become a locomotive for the
development of innovations and very highly specialized solutions, which everyone - both people and
business, and even entire states—is in dire need of now.

4. Conclusion
    The Covid-19 pandemic and consequent lockdowns have obliged companies to face new challenges
such as smart working, remote work and digitalization, accelerating all previous efforts in that direction.
As reported by Gartner, most organizations were already moving their digital agenda forward at a steady
pace, but the Covid-19 pandemic required a significant leap in the development of digital products and
services, with the goal of maintaining and fostering customer engagement. However, digitalization has
generated many cybersecurity issues and the intensification of cyberattacks all around the world [12].
    Amidst the COVID-19 pandemic crisis, various governments and regulatory authorities mandate
both public and private organizations to embrace new practices for working remotely and maintaining
social distancing. There is growth in the need for endpoint and Virtual Private Network (VPN) security
measures and rising demand for cyber hygiene practices to ensure robust security policies and practices
amid Covid-19 pandemic [3].
    Cybersecurity is the protection of vital interests of man and citizen, society and the state during the
use of cyberspace, which ensures the sustainable development of the information society and digital
communication environment, timely detection, prevention and neutralization of real and potential
threats to Ukraine’s national security in cyberspace.
    Cybersecurity is important because it protects all categories of data from theft and damage. This
includes sensitive data, personally identifiable information, protected health information, personal
information, intellectual property, data, and governmental and industry information systems.
    According to a research report “Cybersecurity Market with Covid-19 Impact Analysis by
Component (Software, Hardware, and Services), Software (IAM, Encryption, APT, Firewall), Security
Type, Deployment Mode, Organization Size, Vertical, and Region—Global Forecast to 2026”
published by MarketsandMarkets, In the post-COVID-19 scenario, the global cybersecurity market size
is projected to grow from USD 217.9 Billion in 2021 to $345.4 billion by 2026, recording a Compound
Annual Growth Rate (CAGR) of 9.7% from 2021 to 2026. The market’s growth can be attributed to the
increasing awareness and rising investments in cybersecurity infrastructure across global organizations
operating across verticals.
    Overall cybercrime costs are expected to reach $10.5 trillion annually by 2025, up from $3 trillion
in 2015, according to Cybersecurity Ventures. As a result, security is expected to more than double in
size to $300 billion by 2025 [12].



                                                   249
    As attack methodologies evolve due to AI, machine learning and nation-state hackers, security
startups are receiving a lot of funding to develop products that can secure application access for remote
workers, provide real-time visibility into cyber attacks and protect data as it travels from the cloud to
IoT devices. In this article, we’ll cover the top cybersecurity startups to watch in 2021 [11].

5.   References

[1] K. Wiggers. Cybersecurity startup investments more than doubled in H1 2021, 2021. URL:
     https://venturebeat.com/2021/08/25/cybersecurity-startup-investments-more-than-doubled-in-h1-
     202
[2] Cybersecurity         Market      Overview.     Markets    and      markets,    2021.     URL:
     https://www.marketsandmarkets.com/PressReleases/cyber-security.asp
[3] R. Kissel, Editor. NIST. Computer Security Division Information Technology Laboratory.
     Glossary of Key Information Security Terms, 2019. doi: https://doi.org/10.6028/NIST.IR.7298r3
[4] CISA. What is Cybersecurity? Cybersecurity and Infrastructure Security Agency, 2019. URL:
     https://us-cert.cisa.gov/ncas/tips/ST04-001
[5] Law of Ukraine "On the Basic Principles of Cyber Security of Ukraine" of October 5, 2017 №
     2163-VIII, 2021. URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text.
[6] P. G. Neumann, Computer Security in Aviation: Vulnerabilities, Threats, and Risks, 1997. URL:
     http://www.csl.sri.com/neumann.html
[7] A. Shahani, Is Your Watch Or Thermostat A Spy? Cybersecurity Firms Are On It, 2014. URL:
     https://www.npr.org/sections/alltechconsidered/2014/08/06/338334508/is-your-watch-or-
     thermostat-a-spy-cyber-security-firms-are-on-it
[8] Edward J. Markey, Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk,
     Report, 2015. URL: https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-
     Tracking_Hacking_CarSecurity%202.pdf
[9] Size       of     the     cybersecurity     market   worldwide,      Statista,   2021.    URL:
     https://www.statista.com/search/?q=Size+of+the+cybersecurity+market+worldwide&Search=&q
     Kat=search
[10] MoneyTree Report 2020 Q3, PricewaterhouseCoopers and CB Insights, 2020. URL:
     https://www.pwc.com/us/en/moneytree-report/assets/MoneyTree_Report_2020_Q3.pdf
[11] K. Guercio, Top 22 Cybersecurity Startups to Watch in 202, eSecurity Planet, 2021. URL:
     https://www.esecurityplanet.com/networks/hot-cybersecurity-startups/
[12] M. Bozzetti, L. Olivieri, F. Spoto, Cybersecurity Impacts of the Covid-19 Pandemic in Italy.
     ITASEC’21: Italian Conference on CyberSecurity, Italy, 2021, pp. 145-155. URL: http://ceur-
     ws.org/Vol-2940/paper13.pdf




                                                  250