Cybersecurity in Defense - Thematic Research

Cybersecurity in Defense - Thematic Research

Summary

The threat of cyber-attacks has never been greater, growing in line with increased connectivity between physical and digital systems. Lower barriers to entry for cyberthreat actors, more aggressive attack methods, a dearth of cybersecurity professionals, and patchwork governance mechanisms have aggravated the risk for all companies. This thematic report takes an in-depth look at look at the growing need for cybersecurity in the defense sector and how the threat landscape is being addressed. Firstly, the value chain section summarizes an in-depth description of each of the segments of cybersecurity and outlines the specialist cybersecurity vendors in the defense sector. The challenges section outlines the key challenges being faced by the defense sector. This is followed by an impact assessment detailing the areas which are accelerating the need for cybersecurity. A case study section is then provided, which highlights some key breaches of cybersecurity within the defense sector. A data analysis section provides market size and growth forecasts, followed by mergers and acquisition activity, a cybersecurity timeline, and insight into company filings, hiring, and social media trends. Next, the report highlights key cybersecurity vendors, with a section specializing in cybersecurity defense vendors. It then goes on to outline countries, alliances, organisations and initiatives in cybersecurity.

“Cybersecurity has become a key issue to consider for all sectors, however, the sensitive nature of defense data and consequential national security concerns elevate the importance of data security for defense manufacturers. Cybersecurity for militaries and states is an issue of national security because a successful attack could mean that threat actors gain the ability to control and use destructive weapons, or that critical national infrastructure is weakened.”

The increasing array of sensors and other data streams that make up the OODA loop means there is an increasing number of connected devices which need to be cyber-secure. The Director of Operational Test and Evaluation in the US Department of Defense confirmed that “almost every weapon in the warfighter’s arsenal is software‐defined, and we are more likely to improve system lethality by installing new software than by modifying hardware”. However, each software update can come with its own cybersecurity risk. Data in any format has always been a key discriminator on the battlefield, however, as it is increasingly relied upon in strategy and planning, any data breach would be a significant intelligence coup by an enemy force. The increasing collection and collation of data also mean that companies and militaries are outsourcing some of their data management and storage needs. This will accelerate the need for cybersecurity as bad actors which strategically hunt for potential intelligence, prefer to target smaller suppliers who feed into the largest defense contractors, rather than attempt to attack the larger companies which can have more established cybersecurity.

Scope

This report provides an overview of cybersecurity in defense
This report explains why cybersecurity will continue to grow in importance for the defense industry
This report outlines the variety of key beaches in cybersecurity and how they were rectified in the defense sector
This report provides examples of what companies, countries and organisations are developing watertight cybersecurity strategies.
We highlight defense companies, organisations and countries that are leading in this theme, such as Thales, BAE Systems and Lockheed Martin.

Reasons to Buy

  • To understand cybersecurity and its current and future impact on the industry.
  • To understand how cybersecurity is increasingly difficult and an important challenge that the defense sector is facing.
  • To identify the leading cybersecurity vendors.
  • GlobalData’s thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.


  • Executive Summary
  • Cybersecurity Value Chain
    • Key players in the cybersecurity value chain
      • Table Figure 1: Key players in the cybersecurity value chain
      • Table Figure 2: The cybersecurity value chain
    • Cybersecurity hardware
      • Chip-based security
        • Table Figure 3: The cybersecurity value chain - hardware
    • Cybersecurity software
      • Identity management
        • Table Figure 4: The cybersecurity value chain - software - Identity management: leaders and challengers
      • Network security
        • Table Figure 5: The cybersecurity value chain - software - Network security: leaders and challengers
      • Endpoint security
        • Table Figure 6: The cybersecurity value chain - Endpoint security: leaders and challengers
      • Threat detection and response
        • Table Figure 7: The cybersecurity value chain - Threat detection and response: leaders and challengers
      • Cloud security
        • Table Figure 8: The cybersecurity value chain - software - Cloud security: leaders and challengers
      • Data security
        • Table Figure 9: The cybersecurity value chain - software - Data security: leaders and challengers
      • Email security
        • Table Figure 10: The cybersecurity value chain - software - Email security: leaders and challengers
      • Application security
        • Table Figure 11: The cybersecurity value chain - software - Application security: leaders and challengers
      • Unified threat management
        • Table Figure 12: The cybersecurity value chain - software - Unified threat management: leaders and challengers
      • Vulnerability management
        • Table Figure 13: The cybersecurity value chain - software - Vulnerability management: leaders and challengers
    • Cybersecurity services
      • Managed security services
        • Table Figure 14: The cybersecurity value chain - services - Managed security services: leaders and challengers
      • Post-breach response services
        • Table Figure 15: The cybersecurity value chain - services - Post-breach response services: leaders and challengers
      • Risk and compliance services
        • Table Figure 16: The cybersecurity value chain - services - Risk and compliance services: leaders and challengers
  • Defense Challenges
    • Table Figure 17: US forecast to spend $795.4 billion on defense in 2026
    • Table Key challenges facing the Defense sector
  • The Impact of Cybersecurity on Defense
    • Table Figure 18: We suggest that defense companies, contractors, and subcontractors invest in technologies at every level of
    • How the challenge of competing budgets accelerates the need for cybersecurity
    • How the challenge of a growing data deluge accelerates the need for cybersecurity
    • How the challenge of COVID-19 accelerates the need for cybersecurity
    • How the challenge of minimizing collateral damage accelerates the need for cybersecurity
    • How the challenge of soldier modernization accelerates the need for cybersecurity
    • How the challenge of supply chain disruption accelerates the need for cybersecurity
  • Types of Cyberattacks
    • Targeted cyberattacks
    • Un-targeted cyberattacks
  • Case Studies
    • Targeting third parties/supply chains
    • Social media
      • Table Figure 19: Heat map revealing the position of a US military
    • Military vehicle design
    • Attacks on infrastructure
      • Table Figure 20: F-35 Lightning II
  • Data Analysis
    • Market size and growth forecasts
      • Table Figure 21: Global By 2025, global cybersecurity revenues will have reached $198 billion
      • Table Figure 22: By 2025, manufacturing and government cybersecurity revenues will have reached $27.1 billion
    • Mergers and acquisitions
      • Table Mergers and acquisitions
    • Patent trends
      • Table Figure 23: Cybersecurity patent activity in defense has been growing over the last 10 years
    • Company filings trends
      • Table Figure 24: Mentions of cybersecurity in company filings in defense
    • Hiring trends
      • Table Figure 25: Hiring trends in defense related to cybersecurity
      • Table Figure 26: Raytheon, Leidos, and Boeing have been posting the most cybersecurity related jobs in the last year
      • Chief information security officers (CISOs)
        • Table Chief information security officers (CISOs)
    • Cybersecurity timeline
      • Table Figure 27: The cybersecurity story
  • Countries, Organizations, and Alliances
    • Defensive and offensive cybersecurity initiatives
      • Table Defensive and offensive cybersecurity initiatives
    • Leading cybersecurity alliances
      • Table Leading cybersecurity alliances
    • Leading cybersecurity vendors
      • Table Leading cybersecurity vendors
    • Specialist cybersecurity vendors in defense
      • Table Specialist cybersecurity vendors in defense
  • Sector Scorecard
    • Defense sector scorecard
      • Who's who
        • Table Figure 28: Who does what in the defense space?
      • Thematic screen
        • Table Figure 29: Thematic screen
      • Valuation screen
        • Table Figure 30: Valuation screen
      • Risk screen
        • Table Figure 31: Risk screen
  • Glossary
    • Table Glossary
  • Further Reading
    • GlobalData reports and more
      • Table GlobalData reports and more
  • Our thematic research methodology
    • Table Figure 32: Our five-step approach for generating a sector scorecard
  • About GlobalData
  • Contact Us

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings