# Cybersecurity Companies

Given the current economic times and the heavy influx of security breaches nationwide, which Cybersecurity companies are poised to capitalize on the ever growing threat against data privacy. Do you think companies will be looking to do cybersecurity audits more frequently in the future?

##### Post Metadata
- Posted at: about 6 years ago
- Author title: IT Professional \ Consultant
- Net upvotes: 2


## Comments
### Comment 1

Hi Jake - great questions. Data privacy laws absolutely are impacting the cybersecurity field. Security is one part of the larger &quot;trust ecosystem&quot; comprised of security, privacy, identity, and compliance teams. 

Back in Nov 2019, we created Data Privacy software categories on G2.com to address this growing field (https://www.g2.com/categories/data-privacy-3d79da1e-6384-42b3-a11f-d04b6694e806) which include:

-Data Privacy Management Software
-Privacy Impact Assessment (PIA) Software
-Data Breach Notification Software
-Sensitive Data Discovery Software
-Data De-identification/Pseudonymity Software
-Data Subject Access Request (DSAR) Software
-Consent Management Platform (CMP) Software
-Cookie and Website Tracker Scanning Software
-Identity Verification Software
-Privacy Policy Generator Software
-Other Privacy Software
 
One of the most important aspects of meeting data privacy regulation requirements is properly storing personally identifiable information (PII) -- which includes knowing where it is stored, who has access to it (both internal teams and 3rd parties), where it is stored geographically, data transfers that happen, if it is encrypted, masked, or de-identified (pseudonymized). Using Privacy Impact Assessment (PIA) software enables companies to evaluate, assess, track, and report on the privacy implications of their data.

Secondly, it is important to be able to access that data when fulfilling a user&#39;s request to access, port, or delete the PII a company holds on them (this is called a data subject request or a consumer request &lt;--depends on which privacy jurisdiction we&#39;re talking about). So, locating that data within the legally mandated timeframes (30 days for the GDPR and 45 for the CCPA). 

Considering that data privacy regulations have enforcement mechanisms (fines) on top of brand reputational damage when dealing with data breaches or data loss -- I definitely see this area expanding in the near future and taking cybersecurity right along with it.

##### Comment Metadata
- Posted at: about 6 years ago
- Author title: Market Research Analyst


#### Reply 1

Thank you for your thorough response, sounds like you have some experience in the security industry. Considering the shortage of IT security workers I am glad to see that regulation has bolstered expansion of the field and more awareness across the board. As you had mentioned G2 only recently (Nov. 2019) added these types of businesses/products which I think is a testament to the continued emergence of cybersecurity related products/services. 

##### Reply Metadata
- Posted at: about 6 years ago
- Author title: IT Professional \ Consultant




## Related discussions
- [How well does Trello scale into a larger team?](https://www.g2.com/discussions/1-how-well-does-trello-scale-into-a-larger-team)
  - Posted at: about 13 years ago
  - Comments: 6
- [Can we please add a new section](https://www.g2.com/discussions/2-can-we-please-add-a-new-section)
  - Posted at: about 13 years ago
  - Comments: 0
- [Quantifiable benefits from implementing your CRM](https://www.g2.com/discussions/quantifiable-benefits-from-implementing-your-crm)
  - Posted at: about 13 years ago
  - Comments: 4


