Cybersecurity in Healthcare - Thematic Research

2020-10-19
Price :
Published : Oct-2020
No. of Pages : 94
1 Table of Contents
1.1 List of Tables
1.2 List of Figures
2 Industry Players
3 Industry Trends
3.1 Technology Trends
3.2 Macroeconomic Trends
3.3 Regulatory Trends
3.4 Healthcare Trends
4 Industry Analysis
4.1 Third Wave of Cybersecurity
4.2 A Need for Vigilance and Resilience
4.3 Predictive Risk Assessments
4.4 Market Size and Growth Forecasts
4.5 Understanding the Malware Threat
4.6 Mergers and Acquisitions
4.7 Venture Funding for Cybersecurity Companies
4.8 Timeline
5 Impact of Cybersecurity on the Healthcare Industry
5.1 Cyberattacks Are Increasing Across the Healthcare Industry
5.2 Cost of Cyberattacks to Human Life
5.3 Healthcare Industry Continues to be Target for Ransomware Attacks
5.4 Denial of Service Is a Scary Prospect for Medical Devices
5.5 The Internet of Medical Things Is Vulnerable to Cyberattacks
5.6 Healthcare Companies Lack Network Segmentation
5.7 Cybersecurity Is a Key Emerging Technology for the Biopharmaceutical Industry
5.8 COVID-19: Increased Risk of Cyberattacks Across the Healthcare Industry During the Pandemic
5.9 Healthcare Case Studies
6 Value Chain
6.1 The Cyber-Aware Organization
6.2 The Cybersecurity Organizational Stack
6.3 The Cybersecurity Technology Stack
7 Companies Section
7.1 Public Companies
7.2 Private Companies
7.3 Healthcare Companies
8 Technology Briefing
9 Glossary
9.1 Bibliography
9.2 Glossary
10 Appendix: Our "Thematic" research methodology
10.1 Traditional thematic research does a poor job of picking winners and losers
10.2 Introducing GlobalData's thematic engine
10.3 This is how it works
10.4 How our research reports fit into our overall research methodology
10.5 About GlobalData
10.6 About the Authors
10.7 Contact us
10.8 Disclaimer

List of Tables
Table 1: Technology Trends
Table 2: Macroeconomic Trends
Table 3: Regulatory Trends
Table 4: Healthcare Trends
Table 5: Key M&A Transactions Associated with Cybersecurity
Table 6: Venture Rounds for Cybersecurity Companies since June 2019
Table 7: Key Milestones in the Global Cybersecurity Landscape
Table 8: Public Companies
Table 9: Private Companies
Table 10: Healthcare Companies
Table 11: Glossary

List of Figures
Figure 1: Key Players in the Cybersecurity Industry and Where They Sit in the Value Chain
Figure 2: Market Size and Growth Forecasts
Figure 3: Pharma Executives Expect Cybersecurity to Have a High Impact on the Industry in 2020
Figure 4: Importance of Emerging Technologies to Business over the Next Three Years
Figure 5: Current Pharma Investment in Emerging Technologies
Figure 6: Percentage of Firms Stating Impact of Emerging Technology
Figure 7: Change in Business Spend on Cybersecurity Over Time in the Pharmaceutical Industry
Figure 8: Expected Impact of Cybersecurity on Business Objectives Across the Pharmaceutical Industry
Figure 9: Business Readiness for the Impact of Cybersecurity on the Pharmaceutical Industry
Figure 10: Barriers to Adoption of Cybersecurity in the Pharmaceutical Industry
Figure 11: Value Chain
Figure 12: The Cyber-Aware Organization
Figure 13: Leaders and Challengers in Incident Response
Figure 14: Leaders and Challengers in SOAR
Figure 15: Leaders and Challengers in SIEM
Figure 16: Leaders and Challengers in Threat Management, Intelligence, and Hunting
Figure 17: Leaders and Challengers in Unified Threat Management
Figure 18: Leaders and Challengers in Behavioral Analytics
Figure 19: Leaders and Challengers in Cloud Security
Figure 20: Leaders and Challengers in Email Security
Figure 21: Leaders and Challengers in Network Security
Figure 22: Leaders and Challengers in Application Security
Figure 23: Leaders and Challengers in DevSecOps
Figure 24: Leaders and Challengers in Mobile Security
Figure 25: Leaders and Challengers in Endpoint Security Tools
Figure 26: Leaders and Challengers in IoT Security
Figure 27: Leaders and Challengers in Single Sign-On and Access Management
Figure 28: Leaders and Challengers in Adaptive Authentication and Authorization
Figure 29: Leaders and Challengers in Identity and Access Management
Figure 30: Leaders and Challengers in Vulnerability Management
Figure 31: Leaders and Challengers in Privileged Access Management
Figure 32: Leaders and Challengers in Data Loss Prevention
Figure 33: Leaders and Challengers in Managed Security Services
Figure 34: Leaders and Challengers in Post-Breach Response Services
Figure 35: CSPM Tools Enable Organizations to Identify and Remediate Cloud Security Risks
Figure 36: DevSecOps introduces security earlier in the lifecycle of application development
Figure 37: Five-step Approach for Generating a Sector Scorecard
Filed in: Information Technology
Publisher : GlobalData