Professional Documents
Culture Documents
$400 Billion Each Year.: Cyberattacks
$400 Billion Each Year.: Cyberattacks
Cyber Security
The PureFunds ISE Cyber Security ETF
0
59.
ITS THE PERFECT STORM RESULTING
FROM AN ARRAY OF TRENDS:
E R S2
C YB ENT SOPHISTICATION
E D CID . 8
T
EC TY I N 4 2 Cyberattacks are becoming more
T sophisticated with new tactics,
D E U R I NS) technology, and strategies.
E C LIO Governments and terrorist
S MIL groups are also more involved.
(IN
8. 9
2 SENSITIVE SYSTEMS
HYPERCONNECTIVITY
9.4 Access to the internet
grows each year:
5
201
4 200 million new people
201 connect each year
013
2 IoT is expected to reach
2
201 5.4 billion connected
devices by 2020
1
201
0 E-commerce continues to
201 grow by double digits
year-over-year
DECEMBER 2013
JULY 2014
SEPTEMBER 2014
JUNE 2015
The US has since blamed China for the attacks. China denies
these allegations and has called them "irresponsible".5
K S
A C Web App Attacks
O F
T T Insider Misuse
Y P E S
R A POS Intrusions
// T
B E Payment Card Skimmers
C Y Misc. Errors
Physical Theft/Loss
Denial of Service
0%
10
Cyber Espionage
14
0% 20
8 Crimeware
3
201
12
20
%
60 11
20
10
20
%
40 20
09
08
20
% 07
20 20
06
20
0.2
INSIDER MISUSE
Misuse of data by insiders (or
outsiders via collusion) to take
advantage of systems.
DENIAL-OF-SERVICE
These are attacks (not breaches)
using powerful servers to
overwhelm an organization's
systems with malicious traffic.
CRIMEWARE
Any use of malware to
compromise servers or
desktops. Includes phishing.
CYBER-ESPIONAGE
State-affiliated actors
breach an organization
after intellectual property.
CYBERSECURITY SPENDING IS
EXPLODING
With multiple high-profile cyberattack incidents taking
place over the year, businesses and governments are
scrambling to broaden security measures.
$12
The private sector is in the same boat.
69% of US business executives see B IL
cyberattacks as a threat to their growth. L IO
That's why businesses are spending
more on cybersecurity than ever before.8
N 2010
$5
B IL
L IO
< $1 N
B IL
L IO
N 2005
ROUTERS
ANTI-VIRUS 2000
SECURE SOFTWARE
SERVERS
IP ROUTING
FIREWALLS
Th
e
inc cyb
l e
an udes r se
MALWARE
d s th cu DETECTION TOOLS
oft es rity
wa e h se
re ard cto
pro w r
du are
cts
:
BY 2020, RESEARCH
MARKET SIZE SHOWS THE MARKET IS
EXPECTED TO BE
$170.2 BILLION 9
$200
$170.2 Billion
$150
9.8% CAGR
$106.3 Billion (COMPOUND ANNUAL
GROWTH RATE)
$100
2015 2020
THE SECTORS AT
NT
HIGHEST RISK VERN
M E
E
S E &E
FENSPAC
D RO
FROM CYBERATTACKS GO
AE
Protecting Intellectual property,
infrastructure, financial markets,
health records, and other
important data will only become
more important as our world
becomes more interconnected.10
TAIL CE
RE A N
FIN
U RE
ICAL UCT
R IT STR
C RA
INF
A LTH
HE
A L
N TI
T E LOSS OF TRUST
O
CO OR G AN
T FINANCIAL
COSTS BREACH OF
INFO OR IP
DIVERSIFICATION
Your investment includes various
sub-industries of Cyber Security-
from hardware and software
to consulting
GLOBAL EXPOSURE
Invest in a portfolio
of potentially leading
Cyber Security companies CY
across the globe
S E B ER
CU
R IT
Y
REDUCE RISK HA
HACK seeks to reduce CK
individual company risk by
investing in multiple Cyber
Security companies
LOWER COSTS
ETFs may offer lower costs
than their mutual fund peers
Investments in ETFs are subject to additional risks that do not apply to conventional mutual funds, including risks that the
market price of the shares may trade at a discount to its net asset value (NAV), an active secondary trading market may not
develop or be maintained, or trading may be halted by the exchange in which they trade, which may impact a Funds ability to
sell its shares.
Diversification does not assure a profit, nor does it protect against a loss in a declining market.
Presented by:
Sources:
1: http://www.mcafee.com/ca/resources/reports/rp-economic-impact-cybercrime2.pdf
2: http://www.pwc.com/gx/en/consulting-services/information-security-survey/
3: http://www.reuters.com/article/2015/04/14/usa-cybersecurity-idUSL2N0XB01K20150414
4: http://www.newsweek.com/2014-year-cyber-attacks-295876
5: http://www.businessinsider.com/china-hacked-7-of-america-2015-7
6: http://news.verizonenterprise.com/2015/04/2015-data-breach-report-info/
7: https://www.whitehouse.gov/omb/overview
8: http://www.pwc.com/cybersecurity
9: http://www.marketsandmarkets.com/PressReleases/cyber-security.asp
10: http://img.delivery.net/cm50content/hp/hosted-files/2015_US_CCC_FINAL_4.pdf
Go to http://purefunds.com/media/pdfs/H_Prospectus.pdf The loss or impairment of these rights may adversely affect the
for the prospectus. profitability of these companies. Investments in foreign securities
involve political, economic and currency risks, greater volatility
Investing involves risk, including the possible loss of principal. and differences in accounting methods. The Funds are non-diver-
Shares of any ETF are bought and sold at market price (not sified, meaning they may concentrate its assets in fewer individu-
NAV), may trade at a discount or premium to NAV and are not al holdings than a diversified fund. Investments in smaller compa-
individually redeemed from the Fund. Brokerage commissions nies tend to have limited liquidity and greater price volatility
will reduce returns. Narrowly focused investments typically than large-capitalization companies.
exhibit higher volatility. The fund is concentrated in technolo-
gy-related companies face intense competition, both domesti- The Fund's return may not match or achieve a high degree of
cally and internationally, which may have an adverse effect on correlation with the return of the ISE Cyber Security Index. To the
profit margins. Such companies may have limited product lines, extent the Fund utilizes a sampling approach, it may experience
markets, financial resources or personnel. The products of such tracking error to a greater extent than if the Fund had sought to
companies may face obsolescence due to rapid technological replicate the ISE Cyber Security Index.
developments, frequent new product introduction, unpredict-
able changes in growth rates, competition for the services of
qualified personnel, and competition from foreign competitors Fund holdings and allocations are subject to change at any time.
with lower production costs. Technology companies are heavily Go to (http://pureetfs.com/etfs/hack.html) for fund holdings.
dependent on patent and intellectual property rights.
The funds are distributed by ETFMG Financial LLC.