{"id":4533,"date":"2017-01-31T15:22:20","date_gmt":"2017-01-31T21:22:20","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=4533"},"modified":"2024-06-27T12:52:20","modified_gmt":"2024-06-27T19:52:20","slug":"cybersecurity-market-failure","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/","title":{"rendered":"Cybersecurity Market Failure"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h1>We hit the glass ceiling years ago! Hackers are winning unless we change!<\/h1>\n<p><em>This slide deck was presented by ObjectSecurity CEO Dr. Ulrich Lang at ISSA Cornerstones of Trust 2015.<\/em><\/p>\n<p>The cyber security ecosystem is progressing too slowly; few game-changers find adoption. The \u201cgood guys\u201d are operating under severe constraints: End-user organizations often cannot adopt innovative cybersecurity due to technical, financial, organizational, operational, cultural constraints. Security vendors cannot commercialize truly disruptive cybersecurity because it won\u2019t sell, and investors therefore won\u2019t invest in true cybersecurity innovation.<\/p>\n<p><strong>How to break through the vicious cycle? In particular:<\/strong><\/p>\n<ul>\n<li>The cyber security ecosystem is progressing too slowly because of its many constraints. How to break through the vicious cycle?<\/li>\n<li>Why can\u2019t the cyber security industry progress faster?<\/li>\n<li>How to adopt security innovation inside end-user organizations?<\/li>\n<li>How to provide disruptive security products and services as a vendor?<\/li>\n<\/ul>\n<p>I discuss this market failure, and present various societal and personal options we would have to move cybersecurity (and privacy) forward.<\/p>\n<p><em>Click button to download &#8220;We hit the glass ceiling years ago! Hackers are winning unless we change!<\/em><\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button-border-radius-top-left:2px;--button-border-radius-top-right:2px;--button-border-radius-bottom-right:2px;--button-border-radius-bottom-left:2px;\" target=\"_self\" title=\"Download now\" aria-label=\"Download now\" href=\"https:\/\/objectsecurity.com\/ceo-opinion-cybersecurity-market-failure\/\"><span class=\"fusion-button-text\">Download Slide Deck<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":4615,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[70,1],"tags":[],"class_list":["post-4533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Market Failure - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/\"},\"author\":{\"name\":\"Ulrich Lang\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\"},\"headline\":\"Cybersecurity Market Failure\",\"datePublished\":\"2017-01-31T21:22:20+00:00\",\"dateModified\":\"2024-06-27T19:52:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/\"},\"wordCount\":1159,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/\",\"name\":\"Cybersecurity Market Failure - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2017-01-31T21:22:20+00:00\",\"dateModified\":\"2024-06-27T19:52:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cybersecurity-market-failure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Market Failure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\",\"name\":\"Ulrich Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"caption\":\"Ulrich Lang\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Market Failure - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/"},"author":{"name":"Ulrich Lang","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335"},"headline":"Cybersecurity Market Failure","datePublished":"2017-01-31T21:22:20+00:00","dateModified":"2024-06-27T19:52:20+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/"},"wordCount":1159,"image":{"@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/01\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/","url":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/","name":"Cybersecurity Market Failure - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/01\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1","datePublished":"2017-01-31T21:22:20+00:00","dateModified":"2024-06-27T19:52:20+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/cybersecurity-market-failure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/01\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/01\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/cybersecurity-market-failure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Market Failure"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335","name":"Ulrich Lang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","caption":"Ulrich Lang"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/01\/cyber-security-failure-e1485982398181-600x337-1.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/4533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=4533"}],"version-history":[{"count":3,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/4533\/revisions"}],"predecessor-version":[{"id":4537,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/4533\/revisions\/4537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/4615"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=4533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=4533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=4533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}