Picture

Questions?

+1-866-353-3335

SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: GlobalData | PRODUCT CODE: 1125405

Cover Image

PUBLISHER: GlobalData | PRODUCT CODE: 1125405

Cybersecurity in Healthcare - Thematic Research

PUBLISHED:
PAGES: 62 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 1950
PDF (Site License)
USD 2925
PDF (Global License)
USD 3900

Add to Cart

Cyberattacks are especially dangerous to healthcare

Weak cybersecurity measures expose companies to serious risk. Victim companies suffer operationally, as systems are rendered unusable; reputationally, as customers lose trust; and legally, as ever-stricter regulators seek to punish. The healthcare industry is particularly vulnerable because it uses extremely sensitive data. Pharma companies have proprietary scientific data and intellectual property, medical devices companies develop connected devices, and healthcare companies collect and utilize patient data.

Additionally, operational functions are often literally matters of life and death. Breaches in healthcare and pharma cost more than those in almost any other industry.

After COVID, cyber risk is higher than ever

The rush from in-person care to virtual care and digital monitoring, and from office-based work to remote working, amid the COVID-19 pandemic significantly increased cyber risk. The increased use of technology, especially cloud, increased the potential attack surface, and the high speed of transition required meant many information technology security teams had insufficient time to install adequate security defenses. Healthcare companies, especially hospitals and pharma companies, reported increases in cyberattack attempts and government bodies like the Federal Bureau of Investigation issued warnings about the increased threat.

Scope

  • Key players in the cybersecurity in healthcare space: leading cybersecurity vendors, specialist cybersecurity vendors in healthcare, leading cybersecurity adopters in healthcare.
  • Value chain including a definition of cybersecurity and the different relevant technologies and processes.
  • Key challenges the healthcare industry faces and explanations of how cybersecurity can help. Challenges include manufacturing, marketing and sales, R&D, improving surgery safety, medical training for students and doctors, and improving patient safety
  • Detailed analysis of cybersecurity activity in healthcare using various data sets, including deals, hiring, company filings, and social media.
  • Profiles of private and public companies in the space.

Reasons to Buy

  • See who the leading players are in cybersecurity
  • See how the competitive landscape is evolving, with a review of company activity including mergers and acquisitions (M&A), strategic partnerships and funding deals, as well as a jobs analysis.
  • Understand what cybersecurity is and what it can do.
Product Code: GDHCHT337

Table of Contents

Table of Contents

  • Executive Summary
  • Cybersecurity Value Chain
  • Key players in the cybersecurity value chain
  • Cybersecurity hardware
  • Chip-based security
  • Cybersecurity software
  • Identity management
  • Network security
  • Endpoint security
  • Threat detection and response
  • Cloud security
  • Data security
  • Email security
  • Application security
  • Unified threat management
  • Vulnerability management
  • Cybersecurity Services
  • Managed security services
  • Post-breach response services
  • Risk and compliance services
  • Healthcare Challenges
  • GlobalData's Digital Transformation and Emerging Technology in the Healthcare Industry Survey, 2021
  • The Impact of Cybersecurity on Healthcare
  • How does COVID-19 impact cybersecurity?
  • How does cyber hygiene impact cybersecurity?
  • How do connected devices impact cybersecurity?
  • How does regulation impact cybersecurity?
  • How does AI impact cybersecurity?
  • Case Studies
  • Augmedix uses Trustwave MDR to protect healthcare information
  • Big Tech and data privacy concerns: Google takes control of DeepMind Health
  • Healthcare companies turn to TRIMEDX for cybersecurity solutions
  • Fresenius attack underlines the need for cybersecurity
  • Cybersecurity in Healthcare
  • The NotPetya attack on Merck & Co: Healthcare's biggest cyberattack and a precedent for insurance cases
  • WannaCry compromises NHS services
  • Data Analysis
  • Market size and growth forecasts
  • Mergers and acquisitions
  • Hiring trends
  • Chief information security officers (CISOs)
  • Social media trends
  • Cybersecurity timeline
  • Companies
  • Leading cybersecurity adopters in healthcare
  • Leading cybersecurity vendors
  • Specialist cybersecurity vendors in healthcare
  • Sector Scorecard
  • Clinical Trials sector scorecard
  • Who's who
  • Thematic screen
  • Valuation screen
  • Risk screen
  • Glossary
  • Further Reading
  • GlobalData reports
  • Our Thematic Research Methodology
  • About GlobalData
  • Contact Us
Product Code: GDHCHT337

List of Tables

List of Tables

  • Table 1: Key challenges facing the healthcare sector
  • Table 2: Key M&A transactions associated with the cybersecurity theme since January 2021
  • Table 3: M&A transactions associated with the cybersecurity theme in the healthcare industries since April 2015
  • Table 4: Chief information security officers (CISOs)
  • Table 5: Healthcare companies currently deploying cybersecurity and summarizes their competitive position
  • Table 6: Leading players within the cybersecurity theme and summarizes their competitive position
  • Table 7: Specialist cybersecurity vendors in the healthcare sector and summarizes their competitive position
  • Table 8: Glossary
  • Table 9: GlobalData reports

List of Figures

List of Figures

  • Figure 1: Key players in the cybersecurity value chain
  • Figure 2: The cybersecurity value chain
  • Figure 3: The cybersecurity value chain - hardware
  • Figure 4: The cybersecurity value chain - software
  • Figure 5: The cybersecurity value chain - Network security
  • Figure 6: The cybersecurity value chain - Endpoint security
  • Figure 7: The cybersecurity value chain - Threat detection and response
  • Figure 8: The cybersecurity value chain - Cloud security
  • Figure 9: The cybersecurity value chain - Data security
  • Figure 10: The cybersecurity value chain - Email security
  • Figure 11: The cybersecurity value chain - Application security
  • Figure 12: The cybersecurity value chain - Unified threat management
  • Figure 13: The cybersecurity value chain - Vulnerability management
  • Figure 14: The cybersecurity value chain - Managed security services
  • Figure 15: The cybersecurity value chain - Post-breach response services
  • Figure 16: The cybersecurity value chain - Risk and compliance services
  • Figure 17: Companies are consistently prioritizing cybersecurity
  • Figure 18: Thematic impact assessment for pharma
  • Figure 19: Thematic impact assessment for healthcare
  • Figure 20: Thematic impact assessment for medical devices
  • Figure 21: Cybersecurity spending is forecast to grow in all healthcare sectors
  • Figure 22: Managed security services dominate cybersecurity spending across healthcare
  • Figure 23: Cybersecurity hiring activity is increasing across the healthcare industries
  • Figure 24: COVID-19 sparked hundreds of cyberattacks
  • Figure 25: The cybersecurity story
  • Figure 26: Who does what in the clinical trials space?
  • Figure 27: The thematic screen ranks companies based on overall leadership in the 10 themes that matter most to their industry, generating a leading indicator of future performance
  • Figure 28: Our valuation screen ranks our universe of companies within a sector based on selected valuation metrics
  • Figure 29: Our risk screen ranks companies within a particular sector based on overall investment risk
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!