Security Everywhere: A Growth Engine for the Digital Everywhere: A Growth Engine for the ... by complex technologies; ... more attractive hacking is to hackers.

  • Published on

  • View

  • Download


<ul><li><p>Security Everywhere: A Growth Engine for the </p><p>Digital Economy</p><p>Caspar Herzberg</p><p>VP, Cisco Consulting Services, APJ+GC</p><p>September, 2015</p><p>14.10.2015 2015 Cisco and/or its affiliates. All rights reserved.</p></li><li><p>Technology has become Embedded in Modern Existence</p><p>We live in a digital world enabled </p><p>by complex technologies; but what </p><p>if technology stopped working?</p><p>A Hyper-Connected </p><p>Digital World</p><p> 2015 Cisco and/or its affiliates. All rights reserved.2</p></li><li><p>Present: Internet of Things</p><p>50</p><p>2010 2015 2020</p><p>0</p><p>40</p><p>30</p><p>20</p><p>10</p><p>Bill</p><p>ion o</p><p>f D</p><p>evic</p><p>es</p><p>Bill</p><p>ion o</p><p>f D</p><p>evic</p><p>es</p><p>Bill</p><p>ion o</p><p>f D</p><p>evic</p><p>es</p><p>Bill</p><p>ion o</p><p>f D</p><p>evic</p><p>es</p><p>InflectionInflectionInflectionInflectionPointPointPointPoint</p><p>TimelineTimelineTimelineTimeline</p><p>World Population</p><p>50 Billion Connected Devices by 2020</p><p>12.5</p><p>25</p><p>6.8 7.2 7.6</p><p>Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony</p><p>Source: Cisco Internet of Things Report; Cisco Consulting Analysis 2015 Cisco and/or its affiliates. All rights reserved.3</p></li><li><p>Future: From Internet of Things to Internet of Everything </p><p> 2015 Cisco and/or its affiliates. All rights reserved.4</p><p>combined with latest Disruptive Technologies</p><p>Mobile</p><p>Cloud</p><p>Security</p><p>Big Data</p><p>Social</p><p>Disruptive technologies that enable new business outcomes</p><p>Physical devices and objects connected to the internet</p><p>People, Process, Data and Technology gets interconnected to </p><p>deliver new business value</p><p>make Internet of Everything a new frontier of opportunities</p><p>Leveraging Data into More Useful Information for </p><p>Decision Making </p><p>Data</p><p>Delivering the Right Information to the Right Person (or Machine) at the Right Time </p><p>Process</p><p>Connecting People </p><p>in More Relevant, Valuable Ways</p><p>People</p><p>Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making</p><p>Things</p><p>c</p><p>Internet of Things already here today</p></li><li><p>By 2020, Every Business, Country and City will become a </p><p>Digital Enterprise</p><p> 2015 Cisco and/or its affiliates. All rights reserved.5</p><p>Digital0100</p><p>1011</p><p>0100</p><p>010010110100</p><p>30%of these digitization </p><p>efforts will be successful if they </p><p>can reinvent themselves</p><p>By 2020,</p><p>75%of businesseswill become</p><p>fully digital or preparing to be </p><p>In 2015, </p><p>99.4% of the physical world is </p><p>unconnected today</p><p>Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis</p></li><li><p>The Bad Guys are evolving Cyberattacks are </p><p>increasingly Sophisticated and Dynamic</p><p> 2015 Cisco and/or its affiliates. All rights reserved.6</p><p>20001990 1995 2005 2010 2015 2020</p><p>Viruses19902000</p><p>Worms20002005</p><p>Spyware 2005Today</p><p>APTs CyberwareToday +</p><p>Industrialization of Hacking</p><p>Sophisticated Attacks</p><p>Phishing, Low Sophistication </p><p>75% of all attacks take only minutes to begin </p><p>data exfiltration</p><p>&gt;50% of attacks persist without detection for </p><p>months or years before discovery</p><p>100% of companies connect to domains that </p><p>host malicious files or services</p><p>Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis</p></li><li><p>Dramatic Increase in Number and Scope of Security </p><p>Breaches</p><p> 2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis</p><p>43M</p><p>29M</p><p>25M</p><p>23M</p><p>9M</p><p>2010 2011 2012 2013 2014</p><p>Total Number of Security Incidents</p><p>Number of detected incidents rose to 43M in 2014, a 48% increase from 2013</p><p>Since 2009, we have seen a 66% compounded annual growth rate of </p><p>detected incidents</p><p>2009</p><p>3M</p><p>Costs of Breaches amount to $20M+ for large companies in 2014, almost double </p><p>that of 2013</p><p>The more valuable data becomes, the more attractive hacking is to hackers</p></li><li><p>Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy</p><p> 2015 Cisco and/or its affiliates. All rights reserved.8</p><p>Public SectorManufacturing EnergyFinancial Services Retail</p><p>Countries, Cities, Companies</p><p>Digital0100</p><p>1011</p><p>0100</p><p>Security</p><p>Next-Gen Network Architectures</p><p>Internet of Everything People, Data, Processes and Things</p><p>IT</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.9</p><p>Optimizing Security Readiness: How to Get There</p><p>Phase 2</p><p>Phase 3</p><p>End Vision</p><p> Realign goals, refresh </p><p>human capital and </p><p>leadership</p><p> Secure existing </p><p>enterprise IT network </p><p>i.e. routers, switches, </p><p>servers etc and move </p><p>towards an integrated </p><p>platform</p><p> Pervasive, Integrated, </p><p>Continuous and Open</p><p> Deploy solutions that </p><p>span across IT and </p><p>external networks</p><p> Network seen as a </p><p>Sensor and Enforcer</p><p> Global intelligence </p><p>based on advanced </p><p>algorithms</p><p> 3rd Party Ecosystem </p><p>Open Source</p><p> Advanced Malware </p><p>Protection </p><p>Everywhere</p><p> Predictive, agile and </p><p>dynamic</p><p>SolutionsConvergence </p><p>Security Everywhere</p><p>Integrated Threat Defence</p><p>Organizational Change</p><p>Phase 1</p><p>Se</p><p>cu</p><p>rity</p><p> Re</p><p>ad</p><p>ine</p><p>ss</p><p>Phased Approach to Security Organizational Enablement</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.10</p><p>Phase 1: Organizational Change</p><p>Cultural Change Talent Pool</p><p> Security to be engaged at boardroom level</p><p> Personnel to be embedded into business units</p><p>+ =+</p><p> Increase collaboration between work teams</p><p> Direct or indirect revenue impact</p><p> Invest in human capital</p><p> Training and Up-skilling</p><p>Enablement</p><p>Renew corporate focus </p><p>on Security</p><p>New Metrics</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.11</p><p>ENTERPRISE IT</p><p>Email Security</p><p>Web Security</p><p>Advanced Mature </p><p>Protection</p><p>SecureRouting</p><p>Firewall</p><p>NGIPS</p><p>Secure Access</p><p>Businesses of all sizes must embed security into heart of network to achieve defense in depth.</p><p>Ideally, solutions should move towards a converged model which minimize disparate point-product deployment</p><p>A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats</p><p>Phase 2: Solutions Convergence</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.12</p><p>Phase 3: Security Everywhere across End Points and </p><p>Extended Network</p><p>Security Everywhere</p><p>Extended Network</p><p>End Points &amp; Devices</p><p>Core IT</p><p>Network</p><p>Mobile TelepresenceLaptops</p><p>CloudData CenterBranch CampusEdgeOperationalTechnology</p><p>Switches Routers Server DC Switch WirelessController</p><p>Security EverywherePERVASIVE to persist </p><p>across all attack vectors</p><p>INTEGRATED To share </p><p>information, intelligence, and </p><p>capabilities</p><p>CONTINOUS Allow for </p><p>ongoing protection across full </p><p>attack continuum</p><p>1</p><p>2</p><p>3</p><p>OPEN Option to integrate </p><p>with third parties4</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.13</p><p>End Vision: Integrated Threat Defense</p><p>GLOBAL INTELLIGENCE ADVANCED MALWARE PROTECTION</p><p>AGILE ARCHITECTURE AND PLATFORMS</p><p>Threat Threat Threat Threat ResearchResearchResearchResearch</p><p>Telemetry Telemetry Telemetry Telemetry DataDataDataData</p><p>Advanced Advanced Advanced Advanced AlgorithmsAlgorithmsAlgorithmsAlgorithms</p><p>Security EcosystemSecurity EcosystemSecurity EcosystemSecurity EcosystemContextual SharingContextual SharingContextual SharingContextual Sharing</p><p>Accelerated Containment &amp; RemediationAccelerated Containment &amp; RemediationAccelerated Containment &amp; RemediationAccelerated Containment &amp; Remediation</p><p>Open</p><p>Continuous</p><p>Integrated</p><p>Pervasive</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.14</p><p>Cisco can Accelerate your Digital Journey with Holistic </p><p>Security Solutions</p><p>Secure Access Mgmt.</p><p>Advanced Malware </p><p>Protection</p><p>Cloud / DC Security</p><p>Network Security</p><p>PL</p><p>AN</p><p>Capabilities Assessment</p><p>Architecture and Design</p><p>Custom Threat Intelligence</p><p>BU</p><p>ILD Integration and Deployment</p><p>Security Optimization and Migration</p><p>Managed Threat Defense</p><p>Remote Managed or Hosted ServicesRU</p><p>N</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.15</p><p>Looking Ahead into the Future: Canalys Top Predictions for </p><p>2015</p><p>Cybercrime will reach new levels</p><p>Connected Things will create a major security loophole</p><p>Mobile Payment systems will mean new threats</p><p>DDoS attacks will target hosting and cloud providers</p><p>Security gets C-Levels buy-in</p><p>Increased level of regulation</p><p>Security will shift from being technology-centric to platform-centric</p><p>User will be at heart of every security strategy</p></li><li><p> 2015 Cisco and/or its affiliates. All rights reserved.16</p><p>Embracing Change and Position for the Next Digital </p><p>Disruption</p><p>Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to </p><p>provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated </p><p>threats. John N.Stewart, Chief Security and Trust Officer Cisco</p><p> Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of digital disruption known as Internet of Everything (IoE)</p><p> Security is fundamental to the success of a companys digital strategy as all things get connected</p><p> Security Everywhere enables organizations to be proactive in identifying and addressing cybersecurity risks</p></li></ul>


View more >