Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

Security Everywhere: A Growth Engine for the Digital Economy

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Cargando en…3
×

Eche un vistazo a continuación

1 de 17 Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

Similares a Security Everywhere: A Growth Engine for the Digital Economy (20)

Anuncio

Más de Cisco Russia (20)

Más reciente (20)

Anuncio

Security Everywhere: A Growth Engine for the Digital Economy

  1. 1. Security Everywhere: A Growth Engine for the Digital Economy Caspar Herzberg VP, Cisco Consulting Services, APJ+GC September, 2015 06.10.2015 © 2015 Cisco and/or its affiliates. All rights reserved.
  2. 2. Technology has become Embedded in Modern Existence We live in a digital world enabled by complex technologies; but what if technology “stopped working”? A Hyper- Connected Digital World © 2015 Cisco and/or its affiliates. All rights reserved.2
  3. 3. Present: Internet of Things 50 2010 2015 2020 0 40 30 20 10 BillionofDevices Inflection Point Timeline World Population 50 Billion Connected Devices by 2020 12.5 25 6.8 7.2 7.6 Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony Source: Cisco Internet of Things Report; Cisco Consulting Analysis © 2015 Cisco and/or its affiliates. All rights reserved.3
  4. 4. Future: From Internet of Things to Internet of Everything © 2015 Cisco and/or its affiliates. All rights reserved.4 …combined with latest Disruptive Technologies Disruptive technologies that enable new business outcomes Physical devices and objects connected to the internet People, Process, Data and Technology gets interconnected to deliver new business value …make ‘Internet of Everything’ a new frontier of opportunities c Internet of Things already here today
  5. 5. By 2020, Every Business, Country and City will become a Digital Enterprise © 2015 Cisco and/or its affiliates. All rights reserved.5 Digital 0100 1011 0100 0100 1011 0100 30% of these digitization efforts will be successful if they can reinvent themselves By 2020, 75% of businesses will become fully digital or preparing to be In 2015, 99.4%of the physical world is unconnected today Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis
  6. 6. The “Bad Guys” are evolving – Cyberattacks are increasingly Sophisticated and Dynamic © 2015 Cisco and/or its affiliates. All rights reserved.6 20001990 1995 2005 2010 2015 2020 Viruses 1990–2000 Worms 2000–2005 Spyware 2005–Today APTs Cyberware Today + Industrialization of Hacking Sophisticated Attacks Phishing, Low Sophistication 75% of all attacks take only minutes to begin data exfiltration >50% of attacks persist without detection for months or years before discovery 100% of companies connect to domains that host malicious files or services Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis
  7. 7. Dramatic Increase in Number and Scope of Security Breaches © 2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis 43M 29M 25M 23M 9M 2010 2011 2012 2013 2014 Total Number of Security Incidents Number of detected incidents rose to 43M in 2014, a 48% increase from 2013 Since 2009, we have seen a 66% compounded annual growth rate of detected incidents 2009 3M Costs of Breaches amount to $20M+ for large companies in 2014, almost double that of 2013 The more valuable data becomes, the more attractive hacking is to hackers
  8. 8. Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy © 2015 Cisco and/or its affiliates. All rights reserved.8 Public SectorManufacturing EnergyFinancial Services Retail Countries, Cities, Companies Digital 0100 1011 0100 Security Next-Gen Network Architectures Internet of Everything – People, Data, Processes and Things IT
  9. 9. © 2015 Cisco and/or its affiliates. All rights reserved.9 Optimizing Security Readiness: How to Get There Phase 2 Phase 3 End Vision  Realign goals, refresh human capital and leadership  Secure existing enterprise IT network i.e. routers, switches, servers etc and move towards an integrated platform  Pervasive, Integrated, Continuous and Open  Deploy solutions that span across IT and external networks  Network seen as a Sensor and Enforcer  Global intelligence based on advanced algorithms  3rd Party Ecosystem Open Source  Advanced Malware Protection Everywhere  Predictive, agile and dynamic Solutions Convergence Security Everywhere Integrated Threat Defence Organizational Change Phase 1 SecurityReadiness Phased Approach to Security Organizational Enablement
  10. 10. © 2015 Cisco and/or its affiliates. All rights reserved.10 Phase 1: Organizational Change Cultural Change Talent Pool  Security to be engaged at boardroom level  Personnel to be embedded into business units + =+  Increase collaboration between work teams  Direct or indirect revenue impact  Invest in human capital  Training and Up-skilling Enablement Renew corporate focus on Security New Metrics
  11. 11. © 2015 Cisco and/or its affiliates. All rights reserved.11 ENTERPRISE IT Email Security Web Security Advanced Mature Protection Secure Routing Firewall NGIPS Secure Access Businesses of all sizes must embed security into heart of network to achieve defense in depth. Ideally, solutions should move towards a converged model which minimize disparate point-product deployment A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats Phase 2: Solutions Convergence
  12. 12. © 2015 Cisco and/or its affiliates. All rights reserved.12 Phase 3: Security Everywhere across End Points and Extended Network Security Everywhere Extended Network End Points & Devices Core IT Network Mobile TelepresenceLaptops CloudData CenterBranch CampusEdge Operational Technology Switches Routers Server DC Switch Wireless Controller Security Everywhere PERVASIVE – to persist across all attack vectors INTEGRATED – To share information, intelligence, and capabilities CONTINOUS – Allow for ongoing protection across full attack continuum 1 2 3 OPEN – Option to integrate with third parties 4
  13. 13. © 2015 Cisco and/or its affiliates. All rights reserved.13 End Vision: Integrated Threat Defense GLOBAL INTELLIGENCE ADVANCED MALWARE PROTECTION AGILE ARCHITECTURE AND PLATFORMS Threat Research Telemetry Data Advanced Algorithms Security Ecosystem Contextual Sharing Accelerated Containment & Remediation Open Continuous Integrated Pervasive
  14. 14. © 2015 Cisco and/or its affiliates. All rights reserved.14 Cisco can Accelerate your Digital Journey with Holistic Security Solutions Secure Access Mgmt. Advanced Malware Protection Cloud / DC Security Network Security PLAN Capabilities Assessment Architecture and Design Custom Threat Intelligence BUILD Integration and Deployment Security Optimization and Migration Managed Threat Defense Remote Managed or Hosted Services RUN
  15. 15. © 2015 Cisco and/or its affiliates. All rights reserved.15 Looking Ahead into the Future: Canalys Top Predictions for 2015 Cybercrime will reach new levels Connected Things will create a major security loophole Mobile Payment systems will mean new threats DDoS attacks will target hosting and cloud providers Security gets C-Levels buy-in Increased level of regulation Security will shift from being technology-centric to platform-centric User will be at heart of every security strategy
  16. 16. © 2015 Cisco and/or its affiliates. All rights reserved.16 Embracing Change and Position for the Next Digital Disruption “Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated threats.” John N.Stewart, Chief Security and Trust Officer Cisco • Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of digital disruption known as Internet of Everything (IoE) • Security is fundamental to the success of a company’s digital strategy as all ‘things’ get connected • ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing cybersecurity risks

×