• support@madhedgefundtrader.com
  • Member Login
Mad Hedge Fund Trader
  • Home
  • About
  • Store
  • Luncheons
  • Testimonials
  • Contact Us
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

The Golden Era of Cybersecurity Spend

Tech Letter

The tech sector and the U.S. government are poised to engage in a more transactional relationship than ever before after the cybersecurity attack on Colonial Pipeline and the U.S. President’s executive order that followed it.  

This doesn’t mean just servicing an email account, but this will incorporate broad-based networking cloud infrastructure from the top-down and the bits in between.

Technology is just getting too good, too fast, and applicable to the point that it allows nefarious actors to wield it in a way that could damage and permanently set back sovereign nations and global business.

Don’t get me wrong, this was already in the works, and U.S. President Joe Biden has signaled his intent to ramp up the IT spent, but this cyberattack that is causing gas hoarding in parts of South Eastern United States is just the event to really kick this initiative into overdrive.

Colonial Pipeline paid the almost $5 million ransom payment that will encourage similar type of behavior in the long-term.

The Cyberattack also means that the relationship between U.S. tech and government could swerve from net negative of a relentless anti-monopoly narrative to one in which big tech will be anointed as the saviors to the foreign cyber-criminals and paid handsomely to defend the operations of private and state U.S. business.

The latter sounds much better to Silicon Valley than the former and the bigwigs in Silicon Valley might ostensibly push this marketing dynamic of internet protection to save their bacon and get the regulatory heat off their back.

Polarizing figures such as U.S. Senator Elizabeth Warren have made it a point to bash big tech whenever she sees fit which is more often than not.

CEOs like Facebook’s Mark Zuckerberg have tried a disingenuous approach of blaming China’s marginal data privacy policies as a way to protect its Instagram business and prevent growth monster TikTok, a Chinese app, from cannibalizing its cash cow business.

The origin of the Colonial Attack is purportedly to be Russian which would offer more fuel to the fire and create a ready-made reason for U.S. government to pour incremental billions into Silicon Valley and its array of almost multi-trillion dollar heavy hitters while protecting their business moat.

This event also means Tesla is toast in China. 

Officials in China banned Tesla vehicles from military bases and housing compounds amid concerns that potentially sensitive data from its onboard cameras could be collected and stored on Tesla servers.

Once the data privacy genie is out of the bottle, it’s hard to contain the fallout and Tesla will need to adopt a whack-a-mole strategy in China which often proves futile in the long-term.

The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy. 

This is all just the beginning, a little taste of what’s on the menu.

Collaborating with U.S tech companies to improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors is now a must. 

The Federal Government must also carefully examine what occurred during any major cyber incident and apply lessons learned.

Incremental improvements will not offer the security Americans need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life. 

It’s the authorities’ job and to offer resources to protect and secure its computer systems, whether they are cloud-based, on-premise, or hybrid. 

The scope of protection and security must include systems that process data (information technology (IT)) and those that run the vital machinery that ensures our safety (operational technology (OT)).

Contracts will be signed with IT and OT service providers to conduct an array of day-to-day functions on Federal Information Systems.  These service providers, including cloud service providers, have unique access to and insight into cyber threat and incident information on Federal Information Systems. 

Increasing the sharing of information about such threats, incidents, and risks, and enabling more effective defense of agencies’ systems and of information collected, processed, and maintained by or for the Government are necessary steps to accelerating incident deterrence, prevention, and response efforts.

The executive order signed by Biden shows that within 60 days, the Director of the Office of Management and Budget will hash out “language for contracting with IT and OT service providers and recommend updates.”

The U.S. must take decisive steps to modernize its approach to cybersecurity and must increase the Federal Government’s visibility into threats while protecting privacy and civil liberties.

Money will be spent to accelerate movement to secure cloud services, including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS); centralize and streamline access to cybersecurity data to drive analytics for identifying and managing cybersecurity risks; and invest in both technology and personnel to match these modernization goals.

Prioritizing money spent on addressing “critical software” will translate into huge paydays to many cloud providers and not just the big guys.

Most recently, The Central Intelligence Agency awarded its long-awaited Commercial Cloud Enterprise, or C2E, contract to five companies—Amazon Web Services (AMZN), Microsoft (MSFT), Google (GOOGL), Oracle (ORCL), and IBM (IBM).

No doubt they will be vying for more government procurement contracts since they already have one hand in the honey jar.

At a lower level, readers should consider buying cybersecurity companies Fortinet (FTNT), Palo Alto Networks, Inc. (PANW), and CrowdStrike Holdings, Inc. (CRWD), but these smaller names come with more volatility.

This event really anoints the impending future as the golden era of IT cybersecurity spend and it will never go back to what it once was.

Paying for IT protection is here for the long haul and this goes for private companies and public institutions.  

Nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to deal with distributed IT and work-from-home challenges, according to a new IDG Research Services survey commissioned by Insight Enterprises.

There will be a huge boom in IT cybersecurity spend because CEOs don’t want to be the idiot that allowed cybercriminals to hijack their whole business.

That’s the fastest way to end a management career.

Last time I checked, it’s a hard slog up the corporate ladder to land a prime CEO gig and it’s not getting any easier.

cybersecurity

 

 

Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share by Mail
https://madhedgefundtrader.com/wp-content/uploads/2019/05/cropped-mad-hedge-logo-transparent-192x192_f9578834168ba24df3eb53916a12c882.png 0 0 Mad Hedge Fund Trader https://madhedgefundtrader.com/wp-content/uploads/2019/05/cropped-mad-hedge-logo-transparent-192x192_f9578834168ba24df3eb53916a12c882.png Mad Hedge Fund Trader2021-05-14 15:02:252021-05-21 00:04:48The Golden Era of Cybersecurity Spend
You might also like
An Evening with Bill Gates, Sr.
October 5, 2020
June 4, 2019
April 16, 2021
Ride the Elevator Up With Generative AI
May 14, 2023

tastytrade, Inc. (“tastytrade”) has entered into a Marketing Agreement with Mad Hedge Fund Trader (“Marketing Agent”) whereby tastytrade pays compensation to Marketing Agent to recommend tastytrade’s brokerage services. The existence of this Marketing Agreement should not be deemed as an endorsement or recommendation of Marketing Agent by tastytrade and/or any of its affiliated companies. Neither tastytrade nor any of its affiliated companies is responsible for the privacy practices of Marketing Agent or this website. tastytrade does not warrant the accuracy or content of the products or services offered by Marketing Agent or this website. Marketing Agent is independent and is not an affiliate of tastytrade. 

Legal Disclaimer

There is a very high degree of risk involved in trading. Past results are not indicative of future returns. MadHedgeFundTrader.com and all individuals affiliated with this site assume no responsibilities for your trading and investment results. The indicators, strategies, columns, articles and all other features are for educational purposes only and should not be construed as investment advice. Information for futures trading observations are obtained from sources believed to be reliable, but we do not warrant its completeness or accuracy, or warrant any results from the use of the information. Your use of the trading observations is entirely at your own risk and it is your sole responsibility to evaluate the accuracy, completeness and usefulness of the information. You must assess the risk of any trade with your broker and make your own independent decisions regarding any securities mentioned herein. Affiliates of MadHedgeFundTrader.com may have a position or effect transactions in the securities described herein (or options thereon) and/or otherwise employ trading strategies that may be consistent or inconsistent with the provided strategies.

Copyright © 2025. Mad Hedge Fund Trader. All Rights Reserved. support@madhedgefundtrader.com
  • Privacy Policy
  • Disclaimer
  • FAQ
Link to: May 14, 2021 - Quote of the Day Link to: May 14, 2021 - Quote of the Day May 14, 2021 - Quote of the Day Link to: May 14, 2021 Link to: May 14, 2021 May 14, 2021
Scroll to top