Cybersecurity in Sport - Thematic Intelligence

Cybersecurity in Sport - Thematic Intelligence


Summary

An analysis of the cybersecurity industry and its current landscape, as well as a breakdown of its intersections with sport.

The tech industry is experiencing significant upheaval. Big Tech has made mass layoffs to cut costs, and cybersecurity companies are not immune. However, while IT budgets face scrutiny as companies cut discretionary spending, cybersecurity will remain a priority. According to Cybersecurity Ventures, global cybercrime will reach $10.5 trillion annually by 2025. Tackling this issue requires investment, and GlobalData forecasts that cybersecurity revenues will reach $344 billion worldwide by 2030.

State-sponsored cyberattacks are likely to increase in 2023. The Russian invasion of Ukraine, a continuing trade war between the US and China, and high-profile elections are all catalysts for state-sponsored attacks. Attacks on critical national infrastructure and supply chains will also increase in 2023. These are highly effective at causing large-scale disruption and long-lasting financial impact.

The world of sport is an extremely lucrative one, with many millions of people around the world keeping a close eye on it. This is also what makes it such a prime target for hackers, with enormous sums of money and confidential information that could be used for potential ransoms. While the word of sport has largely been able to keep these threats at bay, increasing sophistication from hacker groups may force adaptation to this.

Who Should Buy

Investors who are attempting to understand the shifting dynamics within the cybersecurity space, and how these will continue to change in the coming years

Sports industry professionals who want a analysis on how sports has been affected thus far by cyber attacks and cybersecurity.

Sports industry workers who are keen to understand which leagues and teams have been affected by the topic.

Key Highlights

A challenging worldwide geopolitical environment, exacerbated by the COVID-19 pandemic and the Russia-Ukraine- conflict, has gifted cyberattackers an uneven playing field, which they are actively exploiting. Those not after money are often motivated by revenge, and these types of attacks typically involve a disgruntled employee or disaffected customer. Other threat actors include hacktivists trying to gain attention for their cause, terrorists intent on damaging critical national infrastructure, or nation-states using cyber warfare against other countries.

An example of a more effective cyber attack came in November 2021, when third party consulting firm Horizon Actuarial was attacked with ransomware. During the attack, the personal data of a number of MLB players and their families was stolen. There were conflicting reports over the number of people impacted, with one report stating the details of over 38,000 people were leaked, while another claimed just over 13,000. The company had received an email from an unknown sender that personal information had been stolen from their servers, and an investigation by the company revealed that two of their computer servers had been accessed for brief periods on two separate days. Faced with the threat of this information being misused, Horizon made the decision to pay the hackers a sum of money, the amount of which was never disclosed. While this stands as one of the few truly effective examples of cyber attacks in sport, it also goes to highlight just how damaging they could be with greater success.

According to GlobalData forecasts, the global cybersecurity market will be worth $334 billion by 2030, having grown at a compound annual growth rate (CAGR) of 10% between 2022 and 2030. Software-based cybersecurity products will be the largest market segment, contributing 44% of total revenue in 2030, with services accounting for 39%.

Scope
  • This report provides breakdowns of the different stages of a cyber attack, and how they can be carried out.
  • It identifies the key leaders with regards to providing competent cybersecurity software for protection.
  • A look at some of the current geopolitical developments that have affected cybersecurity.
  • A detailed look at the cybersecurity value chain, and how value is generated between software, hardware and services.
Reasons to Buy
  • For those wanting an in-depth analysis of the cybersecurity landscape and how it may evolve in the coming years.
  • Discusses how the leading trends within the cybersecurity, as well as the major leaders and challengers in the field.
  • GlobalData’s thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.


Executive Summary
Players
Technology Briefing
Threat actors
Types of cyberattack
Un-targeted cyberattacks
Targeted cyberattacks
Stages of an attack
The survey stage
The delivery stage
The breach stage
The impact stage
Sports industry analysis
History of attacks
Reliance on technology
Trends
Technology trends
Macroeconomic trends
Regulatory trends
Industry Analysis
Market size and growth forecasts
Timeline
Signals
M&A trends
Venture financing trends
Patent trends
Company filing trends
Hiring trends
Value Chain
Cybersecurity hardware
Chip-based security
Cybersecurity software
Identity management
Network security
Endpoint security
Threat detection and response
Cloud security
Data security
Email security
Application security
Unified threat management
Vulnerability management
Cybersecurity services
Managed security services
Post-breach response services
Risk and compliance services
Companies
Public companies
Private companies
Companies
Public companies
Sector Scorecards
Enterprise security software sector scorecard
Who’s who
Thematic screen
Valuation screen
Risk screen
IT services sector scorecard
Who’s who
Thematic screen
Valuation screen
Risk screen
Glossary
Our Thematic Research Methodology
About GlobalData
Contact Us
List of Tables
Table 1: Technology Briefing
Table 2: Technology trends
Table 3: Macroeconomic trends
Table 4: Regulatory trends
Table 5: Key M&A transactions associated with the cybersecurity theme since January 2022
Table 6: Key venture financing deals associated with the cybersecurity theme since September 2022
Table 7: Public companies
Table 8: Private companies
Table 9: Companies
Table 10: Glossary
List of Figures
Figure 1: Who are the leading players in the cybersecurity theme, and where do they sit in the value chain?
Figure 2: Organizations’ technical complexity breeds vulnerability
Figure 3: Global cybersecurity revenues will reach $344 billion by 2030
Figure 4: Managed security services will be the largest market segment, with revenues of $135 billion in 2030
Figure 5: 62% of respondents believe cybersecurity is already disrupting their industry
Figure 6: The cybersecurity story
Figure 7: The number of cybersecurity-related M&A deals peaked in 2021 at 422 deals, declining to 371 in 2022
Figure 8: Cybersecurity patents have remainedf stagnant but high over the last four years
Figure 9: China is the top authority registering cybersecurity patents
Figure 10: Trends in company filings suggest that cybersecurity is a maturing theme
Figure 11: Cybersecurity job postings have been high over the last two years, peaking in December 2022
Figure 12: Technology and communications companies hire the most cybersecurity professionals
Figure 13: The cybersecurity value chain
Figure 14: The cybersecurity value chain – hardware - Chip-based security: leaders and challengers
Figure 15: The cybersecurity value chain – software - Identity management: leaders and challengers
Figure 16: The cybersecurity value chain – software - Network security: leaders and challengers
Figure 17: The cybersecurity value chain – software - Endpoint security: leaders and challengers
Figure 18: The cybersecurity value chain – software - Threat detection and response: leaders and challengers
Figure 19: The cybersecurity value chain – software - Cloud security: leaders and challengers
Figure 20: The cybersecurity value chain – software - Data security: leaders and challengers
Figure 21: The cybersecurity value chain – software - Email security: leaders and challengers
Figure 22: The cybersecurity value chain – software - Application security: leaders and challengers
Figure 23: The cybersecurity value chain – software - Unified threat management: leaders and challengers
Figure 24: The cybersecurity value chain – software - Vulnerability management: leaders and challengers
Figure 25: The cybersecurity value chain – services - Managed security services: leaders and challengers
Figure 26: The cybersecurity value chain – services - Post-breach response services: leaders and challengers
Figure 27: The cybersecurity value chain – services - Risk and compliance services: leaders and challengers
Figure 28: Who does what in the enterprise security software space?
Figure 29: Thematic screen - Enterprise security software sector scorecard
Figure 30: Valuation screen - Enterprise security software sector scorecard
Figure 31: Risk screen - Enterprise security software sector scorecard
Figure 32: Who does what in the IT services space?
Figure 33: Thematic screen - IT services sector scorecard
Figure 34: Valuation screen - IT services sector scorecard
Figure 35: Risk screen - IT services sector scorecard
Figure 36: Our five-step approach for generating a sector scorecard

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings