PrimaryMarkets

Unlocking Liquidity

BusinessNews

Listen

All Episodes

Cybersecurity: The New Macro Theme for Private Markets

Cybersecurity is rapidly emerging as one of the most durable and compelling investment themes in global markets. We explore the key cybersecurity investment themes shaping the landscape and where opportunity is building.


Chapter 1

Cybersecurity as an Investment Macro-Theme

PrimaryMarkets Male

Welcome to Unlocking Liquidity, the podcast from PrimaryMarkets that brings the dynamic world of private capital to life. Each week, we dive into the trends, opportunities and challenges shaping today’s investment landscape, from emerging asset classes and market innovation through to strategies for navigating liquidity in unlisted markets. Whether you’re an experienced investor, a dealmaker, or simply curious about private markets, Unlocking Liquidity offers analysis and real-world insights to help you make sense of complexity and stay ahead of what’s next.

PrimaryMarkets Male

In today’s increasingly digital economy, cybersecurity is no longer just an IT function — it’s a foundational pillar of global infrastructure and one of the most compelling investment themes of our time. As organisations accelerate digital transformation, the demand for resilient, scalable security solutions is driving significant capital flows across private markets. In this episode of Unlocking Liquidity, we explore cybersecurity as a macro investment theme — from the rise of zero trust architecture and identity security to the growing importance of SaaS protection and critical infrastructure defence. We’ll unpack where investors are focusing their attention, what’s driving valuations, and how platforms like PrimaryMarkets are providing access to opportunities shaping the future of digital security.

Chapter 2

Where Capital is Flowing

PrimaryMarkets Male

In an era where digital transformation has shifted from strategic aspiration to operational imperative, cybersecurity has emerged as one of the most compelling investment themes for investors. The sector's resilience during economic uncertainty, combined with accelerating regulatory pressures and an expanding threat landscape, has positioned it, at the very least, as a defensive growth play but with very significant upside potential. For investors seeking exposure in the private markets, understanding where capital is genuinely flowing within the cybersecurity ecosystem has become essential to identifying tomorrow's winners.

PrimaryMarkets Male

The macroeconomic backdrop for cybersecurity investment remains remarkably robust. Global information security spending is projected to total US$212 billion in 2025, representing a 15.1% increase from 2024, according to Gartner. This growth trajectory stands in stark contrast to broader technology spending patterns, reflecting the non-discretionary nature of cybersecurity investment. Unlike discretionary technology projects that often face budget cuts during economic contractions, cybersecurity has demonstrated counter-cyclical characteristics. Most organisations report growing cybersecurity budgets which is a claim that few technology categories can make.

Chapter 3

The Shift to Zero Trust Architecture

PrimaryMarkets Male

Perhaps no cybersecurity investment theme has captured more capital attention than zero trust architecture. Moving beyond the traditional perimeter-based security model, zero trust operates on the principle of continuous verification for every user, device and connection. The global zero trust architecture market is substantial and is anticipated to grow significantly. This growth reflects a fundamental architectural shift in how organisations approach security, driven by the dissolution of traditional network boundaries and the proliferation of remote work arrangements.

PrimaryMarkets Male

The investment case for zero trust extends beyond pure security considerations. Organisations adopting zero trust architecture report streamlined compliance processes, reduced insider threats and improved agility in deploying cloud-native applications. These operational benefits have transformed zero trust from a security initiative into a strategic enabler of business transformation, making it particularly attractive to investors seeking platforms that deliver measurable return on investment beyond risk mitigation.

PrimaryMarkets Male

Government mandates have provided substantial tailwinds for zero trust investments. Public sector commitment creates a multiplier effect throughout the ecosystem, as government adoption drives standardisation and encourages private sector implementation. The challenge for investors lies in navigating the implementation complexity. Zero trust is not a single product but a comprehensive framework requiring orchestration across identity management, network segmentation and continuous monitoring platforms. Companies that can deliver integrated solutions rather than point products are commanding premium valuations in private markets.

Chapter 4

Identity Security: The New Perimeter

PrimaryMarkets Male

As the traditional network perimeter has evaporated, identity has emerged as the new battleground for cybersecurity investment. Identity theft and unmanaged permissions across enterprises have created a massive technical security burden that organisations are struggling to control. This challenge has spawned an entire category of identity-centric security solutions, from privileged access management to identity governance platforms.

PrimaryMarkets Male

The investment thesis for identity security is compelling in its simplicity: every digital interaction requires authentication, making identity infrastructure universally applicable across all industries and companies globally. Multi-factor authentication (2FA or MFA) alone commands significant market share, with demand driven by the inadequacy of password-based security in modern threat environments. The identity security category offers investors a choice of mature players generating substantial recurring revenue or emerging innovators addressing specific identity challenges in specific environments.

PrimaryMarkets Male

The convergence of identity security with zero trust principles has created particularly attractive investment opportunities. Solutions that combine identity verification, device posture assessment and contextual access decisions represent the evolution beyond static authentication to dynamic trust evaluation. Companies operating at this intersection are attracting strategic interest from both platform vendors seeking to complete their security portfolios and investors recognising the criticality of identity infrastructure.

Chapter 5

SaaS Security: Protecting the New Enterprise Infrastructure

PrimaryMarkets Male

The rapid proliferation of Software-as-a-Service applications has fundamentally altered the enterprise technology landscape, creating both operational efficiencies and security vulnerabilities. Despite economic uncertainty, organisations have continued to increase investment in SaaS security. This expansion reflects the realisation that traditional security tools designed for on-premises infrastructure are inadequate for cloud-based applications.

PrimaryMarkets Male

The global SaaS security market was valued at approximately US$11billion in 2024 and is expected to grow significantly. This growth is being driven by high-profile breaches of SaaS platforms, which have demonstrated that even applications hosted by major technology providers can be vulnerable to sophisticated attacks. The investment opportunity lies in solutions that provide continuous configuration management, threat detection and data governance specifically designed for SaaS environments.

PrimaryMarkets Male

SaaS Security Posture Management platforms have emerged as the critical category within this theme. These solutions provide organisations with visibility into their SaaS stack, identify misconfigurations that could lead to data exposure and monitor third-party application integrations that create security risks. The category has matured rapidly, with adoption rates nearly tripling in recent years as organisations recognise that traditional security tools lack the necessary visibility into cloud-based application environments.

PrimaryMarkets Male

For investors evaluating opportunities in this space, the key differentiator is the ability to provide actionable intelligence rather than simply cataloguing risks. Platforms that can automatically remediate misconfigurations, enforce security policies across multiple SaaS applications and integrate with existing security operations workflows are commanding premium valuations. The recurring revenue nature of these solutions, combined with high switching costs once embedded in security operations, creates attractive retention economics.

Chapter 6

Critical Infrastructure Protection: A Government-Driven Opportunity

PrimaryMarkets Male

The protection of critical infrastructure has evolved from a niche security concern to a national security imperative, creating substantial investment opportunities underpinned by government mandates and regulations. Recent high-profile incidents affecting energy, telecommunications and water systems have galvanised both public and private sector commitment to strengthening operational technology security. This focus has particular relevance for large institutional investors, as critical infrastructure protection typically involves larger transaction sizes and longer-term contracts than traditional cybersecurity engagements.

PrimaryMarkets Male

Government and institutional support creates a foundation for private sector investment, as government-funded research and development often precedes commercial opportunities. The convergence of information technology and operational technology security represents a particularly compelling theme, as industrial control systems and supervisory control and data acquisition platforms increasingly connect to enterprise networks.

PrimaryMarkets Male

In Australia, critical infrastructure protection has received significant government attention and investment. Critical infrastructure operators now face prescriptive risk management duties covering 22 asset classes, forcing rapid modernisation of operational technology defences. This regulatory environment has created substantial demand for security solutions designed specifically for industrial and operational technology environments, where traditional IT security approaches are often inadequate due to unique operational requirements and legacy system constraints.

PrimaryMarkets Male

The Australian context presents distinctive opportunities for investors. The Australian cybersecurity market is expected to continue to grow significantly, driven by both regulatory requirements and the country's geographic position as a testing ground for cyber capabilities in the Asia-Pacific region. Australian companies are developing specialised solutions for the local market that combine cloud-based security platforms with specific capabilities required for defence and government applications.

PrimaryMarkets Male

While the Federal government allocated $291 million to subsidise small and medium enterprise security controls, it is clear that ongoing budget constraints means that private capital will need to fill gaps previously addressed by government spending. This dynamic creates opportunities for investors who can identify solutions that deliver enterprise-grade security capabilities at price points accessible to mid-market organisations. The talent shortage remains acute, with Australia requiring thousands of additional cybersecurity professionals.

Chapter 7

The Platform Consolidation Wave

PrimaryMarkets Male

Beyond individual security categories, a significant macro theme shaping cybersecurity investment is the rapid consolidation of point solutions into comprehensive platforms. IBM's acquisition of HashiCorp for US$6.4 billion illustrates the scale of transactions. This consolidation trend reflects both vendor strategy and customer preference, as organisations seek to reduce the complexity of managing dozens of separate security tools while improving integration and operational efficiency.

PrimaryMarkets Male

The platform consolidation thesis is particularly relevant. Security vendors with comprehensive platforms that address multiple security domains can command higher valuations and deliver superior retention economics compared to point solutions that address narrow use cases. This dynamic has created a two-tier market structure where platform vendors enjoy pricing power and market expansion opportunities, while innovative point solutions face pressure to either achieve rapid scale or position themselves as acquisition targets.

PrimaryMarkets Male

For investors, understanding the consolidation landscape requires evaluating both organic growth potential and strategic positioning. Companies that have built platforms addressing complementary security domains can offer acquirers immediate capability expansion and cross-selling opportunities into established customer bases. The challenge lies in timing, as the window between achieving product-market fit and facing commoditisation pressure can be narrow in rapidly evolving security categories.

Chapter 8

Investment Considerations for Investors

PrimaryMarkets Male

For investors evaluating cybersecurity opportunities through platforms like PrimaryMarkets, several factors warrant particular attention. First, the regulatory environment continues to evolve rapidly, with data protection requirements and breach notification obligations creating both compliance burdens and demand drivers for security solutions. Companies positioned to address emerging regulatory requirements, particularly in identity security and data governance, benefit from built-in demand independent of general economic conditions.

PrimaryMarkets Male

Second, the integration of artificial intelligence into both offensive and defensive cybersecurity capabilities is reshaping competitive dynamics. Solutions that leverage machine learning for threat detection and automated response are increasingly common. The investment opportunity lies in platforms that can deliver measurable improvements in security operations efficiency, particularly in environments facing acute talent shortages. Australian organisations, operating in a market with constrained security talent, represent particularly attractive targets for solutions that automate labour-intensive security functions.

PrimaryMarkets Male

Third, recurring revenue quality varies significantly across cybersecurity categories. Investors need to distinguish between solutions that deliver ongoing value and justify subscription renewal from those that face commoditisation pressure or switching risk. Identity infrastructure, zero trust platforms and SaaS security solutions generally demonstrate superior retention characteristics due to high switching costs and operational criticality, while endpoint security and network perimeter solutions face greater competitive pressure and pricing challenges.

PrimaryMarkets Male

Finally, the geographic dimension of cybersecurity investment deserves consideration. While major markets like the US and Europe command the majority of cybersecurity spending, emerging markets are experiencing rapid growth from lower bases. The Australian market offers particularly compelling dynamics, combining sophisticated security requirements driven by government and financial services sectors with a growing startup ecosystem and supportive regulatory environment. Australian cybersecurity companies increasingly compete globally while maintaining strong domestic positions, creating potential for investors to access international growth trajectories through local companies.

Chapter 9

Conclusion: A Durable Investment Theme

PrimaryMarkets Male

Cybersecurity has transitioned from a technology infrastructure cost to a strategic investment category with durable growth characteristics and increasingly attractive unit economics. The convergence of expanding cyber security attacks, regulatory pressures and digital transformation imperatives has created a rare combination of defensive positioning and growth potential. For investors, understanding where capital is flowing within the cybersecurity ecosystem provides crucial insight into identifying tomorrow's market leaders.

PrimaryMarkets Male

The themes of zero trust architecture, identity security, SaaS protection and critical infrastructure defence represent more than just a tactical security response to current threats. They reflect fundamental shifts in how organisations architect and operate digital infrastructure, creating sustained demand for platforms that enable these transitions. As the cybersecurity market continues to mature and consolidate, investors who can identify companies delivering measurable security outcomes with strong recurring revenue characteristics and defensible market positions will likely capture substantial value in this essential and expanding sector.

Chapter 10

PrimaryMarkets

PrimaryMarkets Male

For companies and managed funds that are not listed on a stock exchange, the PrimaryMarkets trading Platform is an ideal way to facilitate the off-market sale of shares in your company and units in managed funds.

PrimaryMarkets Male

PrimaryMarkets is a flexible and evolving Platform that responds in real time to an ever-changing investment environment. In doing so, it provides sophisticated investors with access to companies that are shaping the future in a wide variety of industries and sectors. We provide access to opportunities previously only accessible to institutional investors. In addition to trading, PrimaryMarkets helps companies raise capital from our global investor database.

PrimaryMarkets Male

PrimaryMarkets exemplifies how innovation can transform the way we invest, trade and raise capital by breaking down traditional barriers, providing liquidity solutions and promoting transparency.

PrimaryMarkets Male

As the Platform continues to grow and evolve, it promises to unlock even more opportunities for investors and companies shaping the future of economies.

PrimaryMarkets Male

And that brings us to the end of this episode of Unlocking Liquidity. Thanks for spending your time with us, we hope today’s conversation gave you a fresh perspective on private markets and how liquidity is evolving. If you enjoyed the episode, please follow or subscribe wherever you listen, and feel free to share it with someone who’d get value from it. For more insights, opportunities and episodes, visit PrimaryMarkets.com. Until next time, thanks for listening, and we’ll see you in the next conversation.