NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

表紙
市場調查報告書

醫療保健中的網絡安全:主題調查

Cybersecurity in Healthcare - Thematic Research

出版商 GlobalData 商品編碼 967318
出版日期 內容資訊 英文 94 Pages
訂單完成後即時交付
價格
醫療保健中的網絡安全:主題調查 Cybersecurity in Healthcare - Thematic Research
出版日期: 2020年10月19日內容資訊: 英文 94 Pages
簡介

醫療保健行業,包括生物製藥公司,醫療保健提供商和保險公司,由於其大量有價值的敏感數據而成為惡意網絡威脅參與者的目標。生物製藥行業還容易受到激進主義者的抗議,這些抗議者抗議動物實驗,高昂的藥品價格以及其他道德和政治問題。

隨著醫療保健行業變得越來越數位化,網絡罪犯將獲得一種從醫療記錄和連接的醫療設備中竊取個人和專有數據的方式。對於生物製藥公司而言,網絡攻擊的後果可能是驚人的,從IP盜竊,運營中斷到臨床試驗和生產,由於藥品銷售減少,收入增加,訴訟風險增加以及信譽不佳而造成的收入損失。

本報告調查醫療保健中的網絡安全,並顯示行業趨勢,市場規模和增長預測,以及影響網絡安全領域(例如大公司,醫療保健,技術,宏觀經濟和法規)的重大併購活動,網絡安全對醫療保健行業和價值鏈的影響。

目錄

第1章目錄

  • 表列表
  • 圖片清單

第2章工業公司

第3章行業趨勢

  • 技術趨勢
  • 宏觀經濟趨勢
  • 監管趨勢
  • 醫療保健趨勢

第4章行業分析

  • 第三波網絡安全
  • 保持警惕和應變能力
  • 預測風險評估
  • 市場規模和增長預測
  • 瞭解惡意軟件的威脅
  • 併購
  • 網絡安全公司的風險投資
  • 時間軸

第5章網絡安全對醫療保健行業的影響

  • 整個醫療保健行業的網絡攻擊增加
  • 網絡攻擊對人類生命造成的損失
  • 醫療保健行業仍然是勒索軟件攻擊的目標
  • DoS是醫療設備的可怕前景
  • IoMT(醫療物聯網)容易受到網絡攻擊
  • 醫療保健公司缺乏網絡細分
  • 網絡安全是生物製藥行業一項重要的新興技術
  • COVID-19:大流行期間整個醫療保健行業遭受網絡攻擊的風險增加
  • 醫療保健案例研究

第6章價值鏈

  • 網絡意識組織
  • 網絡安全組織架構
  • 網絡安全技術堆棧

第7章公司部分

  • 公營企業
  • 私人公司
  • 醫療保健公司

第8章技術概述

第9章詞彙表

  • 參考
  • 詞彙表

第10章附錄:我們的 "主題" 調查方法

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: GDHCHT185

The healthcare industry, including biopharmaceutical companies, healthcare providers, and payers, is targeted by malicious cyber threat actors due to the vast amount of valuable and sensitive data it holds. The biopharmaceutical industry is also vulnerable to attacks from activists, who protest against animal testing of drugs, high drug prices, and other ethical and political issues. As the healthcare industry becomes more digitized, it will provide cybercriminals with increased methods of stealing personal and proprietary data, including from medical health records and connected medical devices. For biopharmaceutical companies, the consequences of cyberattacks can be staggering, ranging from stolen IP, operational disruption to clinical trials and manufacturing, lost revenue through reduced drug sales, increased litigation risk, and reputation damage.

The increasingly sophisticated tools at hackers' disposal reinforces the need for comprehensive cybersecurity approaches involving people, processes, and technology that are relevant to detection, prediction, prevention, and rapid response.

Scope

Components of the report include -

  • Key Industry Players: leading companies in the Cybersecurity space
  • Industry Trends: key trends impacting the Cybersecurity space classified into healthcare, technology, macroeconomic, and regulatory themes.
  • The Industry Analysis section includes:
  • Market size and growth forecast of the global security 2019-2030
  • Key M&A activity in 2019 and early 2020, with several vendors making acquisitions to enhance their offerings in areas such as zero trust networking, IoT, OT security, and endpoint protection.
  • Venture funding of cybersecurity companies
  • Impact of Cybersecurity on Healthcare Industry including a number of case studies that demonstrate how cybersecurity impacts the healthcare industry and how companies in the space are using cybersecurity for improved outcomes.
  • Value Chain: overview of the value chain made up of three main areas: the cyber-aware organization, the cybersecurity organizational stack, and the cybersecurity technology stack.

Reasons to Buy

  • Develop business strategies by understanding how cybersecurity will be used and shape the healthcare industry moving forward.
  • Stay up to date on the key players in the cybersecurity space and where they sit in the value chain.
  • See what activities healthcare companies are taking to secure their data
  • Identify emerging industry trends to gain a competitive advantage.
  • Identify opportunities for partnerships with cybersecurity and the healthcare industries

Table of Contents

1 Table of Contents

  • 1.1 List of Tables
  • 1.2 List of Figures

2 Industry Players

3 Industry Trends

  • 3.1 Technology Trends
  • 3.2 Macroeconomic Trends
  • 3.3 Regulatory Trends
  • 3.4 Healthcare Trends

4 Industry Analysis

  • 4.1 Third Wave of Cybersecurity
  • 4.2 A Need for Vigilance and Resilience
  • 4.3 Predictive Risk Assessments
  • 4.4 Market Size and Growth Forecasts
  • 4.5 Understanding the Malware Threat
  • 4.6 Mergers and Acquisitions
  • 4.7 Venture Funding for Cybersecurity Companies
  • 4.8 Timeline

5 Impact of Cybersecurity on the Healthcare Industry

  • 5.1 Cyberattacks Are Increasing Across the Healthcare Industry
  • 5.2 Cost of Cyberattacks to Human Life
  • 5.3 Healthcare Industry Continues to be Target for Ransomware Attacks
  • 5.4 Denial of Service Is a Scary Prospect for Medical Devices
  • 5.5 The Internet of Medical Things Is Vulnerable to Cyberattacks
  • 5.6 Healthcare Companies Lack Network Segmentation
  • 5.7 Cybersecurity Is a Key Emerging Technology for the Biopharmaceutical Industry
  • 5.8 COVID-19: Increased Risk of Cyberattacks Across the Healthcare Industry During the Pandemic
  • 5.9 Healthcare Case Studies

6 Value Chain

  • 6.1 The Cyber-Aware Organization
  • 6.2 The Cybersecurity Organizational Stack
  • 6.3 The Cybersecurity Technology Stack

7 Companies Section

  • 7.1 Public Companies
  • 7.2 Private Companies
  • 7.3 Healthcare Companies

8 Technology Briefing

9 Glossary

  • 9.1 Bibliography
  • 9.2 Glossary

10 Appendix: Our "Thematic" research methodology

  • 10.1 Traditional thematic research does a poor job of picking winners and losers
  • 10.2 Introducing GlobalData's thematic engine
  • 10.3 This is how it works
  • 10.4 How our research reports fit into our overall research methodology
  • 10.5 About GlobalData
  • 10.6 About the Authors
  • 10.7 Contact us
  • 10.8 Disclaimer

List of Tables

List of Tables

  • Table 1: Technology Trends
  • Table 2: Macroeconomic Trends
  • Table 3: Regulatory Trends
  • Table 4: Healthcare Trends
  • Table 5: Key M&A Transactions Associated with Cybersecurity
  • Table 6: Venture Rounds for Cybersecurity Companies since June 2019

T

List of Figures

List of Figures

  • Figure 1: Key Players in the Cybersecurity Industry and Where They Sit in the Value Chain
  • Figure 2: Market Size and Growth Forecasts
  • Figure 3: Pharma Executives Expect Cybersecurity to Have a High Impact on the Industry in 2020
  • Figure 4: Importance of Emerging Technologies to Business over the Next Three Years
  • Figure 5: Current Pharma Investment in Emerging Technologies
  • Figure 6: Percentage of Firms Stating Impact of Emerging Technology
  • Figure 7: Change in Business Spend on Cybersecurity Over Time in the Pharmaceutical Industry
  • Figure 8: Expected Impact of Cybersecurity on Business Objectives Across the Pharmaceutical Industry
  • Figure 9: Business Readiness for the Impact of Cybersecurity on the Pharmaceutical Industry
  • Figure 10: Barriers to Adoption of Cybersecurity in the Pharmaceutical Industry
  • Figure 11: Value Chain
  • Figure 12: The Cyber-Aware Organization
  • Figure 13: Leaders and Challengers in Incident Response
  • Figure 14: Leaders and Challengers in SOAR
  • Figure 15: Leaders and Challengers in SIEM
  • Figure 16: Leaders and Challengers in Threat Management, Intelligence, and Hunting
  • Figure 17: Leaders and Challengers in Unified Threat Management
  • Figure 18: Leaders and Challengers in Behavioral Analytics
  • Figure 19: Leaders and Challengers in Cloud Security
  • Figure 20: Leaders and Challengers in Email Security
  • Figure 21: Leaders and Challengers in Network Security
  • Figure 22: Leaders and Challengers in Application Security
  • Figure 23: Leaders and Challengers in DevSecOps
  • Figure 24: Leaders and Challengers in Mobile Security
  • Figure 25: Leaders and Challengers in Endpoint Security Tools
  • Figure 26: Leaders and Challengers in IoT Security
  • Figure 27: Leaders and Challengers in Single Sign-On and Access Management
  • Figure 28: Leaders and Challengers in Adaptive Authentication and Authorization
  • Figure 29: Leaders and Challengers in Identity and Access Management
  • Figure 30: Leaders and Challengers in Vulnerability Management
  • Figure 31: Leaders and Challengers in Privileged Access Management
  • Figure 32: Leaders and Challengers in Data Loss Prevention
  • Figure 33: Leaders and Challengers in Managed Security Services
  • Figure 34: Leaders and Challengers in Post-Breach Response Services
  • Figure 35: CSPM Tools Enable Organizations to Identify and Remediate Cloud Security Risks
  • Figure 36: DevSecOps introduces security earlier in the lifecycle of application development
  • Figure 37: Five-step Approach for Generating a Sector Scorecard