Security Everywhere: A Growth Engine for the Digital Everywhere: A Growth Engine for the ... by complex technologies; ... more attractive hacking is to hackers

  • Published on
    28-Apr-2018

  • View
    220

  • Download
    7

Embed Size (px)

Transcript

  • Security Everywhere: A Growth Engine for the

    Digital Economy

    Caspar Herzberg

    VP, Cisco Consulting Services, APJ+GC

    September, 2015

    14.10.2015 2015 Cisco and/or its affiliates. All rights reserved.

  • Technology has become Embedded in Modern Existence

    We live in a digital world enabled

    by complex technologies; but what

    if technology stopped working?

    A Hyper-Connected

    Digital World

    2015 Cisco and/or its affiliates. All rights reserved.2

  • Present: Internet of Things

    50

    2010 2015 2020

    0

    40

    30

    20

    10

    Bill

    ion o

    f D

    evic

    es

    Bill

    ion o

    f D

    evic

    es

    Bill

    ion o

    f D

    evic

    es

    Bill

    ion o

    f D

    evic

    es

    InflectionInflectionInflectionInflectionPointPointPointPoint

    TimelineTimelineTimelineTimeline

    World Population

    50 Billion Connected Devices by 2020

    12.5

    25

    6.8 7.2 7.6

    Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony

    Source: Cisco Internet of Things Report; Cisco Consulting Analysis 2015 Cisco and/or its affiliates. All rights reserved.3

  • Future: From Internet of Things to Internet of Everything

    2015 Cisco and/or its affiliates. All rights reserved.4

    combined with latest Disruptive Technologies

    Mobile

    Cloud

    Security

    Big Data

    Social

    Disruptive technologies that enable new business outcomes

    Physical devices and objects connected to the internet

    People, Process, Data and Technology gets interconnected to

    deliver new business value

    make Internet of Everything a new frontier of opportunities

    Leveraging Data into More Useful Information for

    Decision Making

    Data

    Delivering the Right Information to the Right Person (or Machine) at the Right Time

    Process

    Connecting People

    in More Relevant, Valuable Ways

    People

    Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making

    Things

    c

    Internet of Things already here today

  • By 2020, Every Business, Country and City will become a

    Digital Enterprise

    2015 Cisco and/or its affiliates. All rights reserved.5

    Digital0100

    1011

    0100

    010010110100

    30%of these digitization

    efforts will be successful if they

    can reinvent themselves

    By 2020,

    75%of businesseswill become

    fully digital or preparing to be

    In 2015,

    99.4% of the physical world is

    unconnected today

    Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis

  • The Bad Guys are evolving Cyberattacks are

    increasingly Sophisticated and Dynamic

    2015 Cisco and/or its affiliates. All rights reserved.6

    20001990 1995 2005 2010 2015 2020

    Viruses19902000

    Worms20002005

    Spyware 2005Today

    APTs CyberwareToday +

    Industrialization of Hacking

    Sophisticated Attacks

    Phishing, Low Sophistication

    75% of all attacks take only minutes to begin

    data exfiltration

    >50% of attacks persist without detection for

    months or years before discovery

    100% of companies connect to domains that

    host malicious files or services

    Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis

  • Dramatic Increase in Number and Scope of Security

    Breaches

    2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis

    43M

    29M

    25M

    23M

    9M

    2010 2011 2012 2013 2014

    Total Number of Security Incidents

    Number of detected incidents rose to 43M in 2014, a 48% increase from 2013

    Since 2009, we have seen a 66% compounded annual growth rate of

    detected incidents

    2009

    3M

    Costs of Breaches amount to $20M+ for large companies in 2014, almost double

    that of 2013

    The more valuable data becomes, the more attractive hacking is to hackers

  • Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy

    2015 Cisco and/or its affiliates. All rights reserved.8

    Public SectorManufacturing EnergyFinancial Services Retail

    Countries, Cities, Companies

    Digital0100

    1011

    0100

    Security

    Next-Gen Network Architectures

    Internet of Everything People, Data, Processes and Things

    IT

  • 2015 Cisco and/or its affiliates. All rights reserved.9

    Optimizing Security Readiness: How to Get There

    Phase 2

    Phase 3

    End Vision

    Realign goals, refresh

    human capital and

    leadership

    Secure existing

    enterprise IT network

    i.e. routers, switches,

    servers etc and move

    towards an integrated

    platform

    Pervasive, Integrated,

    Continuous and Open

    Deploy solutions that

    span across IT and

    external networks

    Network seen as a

    Sensor and Enforcer

    Global intelligence

    based on advanced

    algorithms

    3rd Party Ecosystem

    Open Source

    Advanced Malware

    Protection

    Everywhere

    Predictive, agile and

    dynamic

    SolutionsConvergence

    Security Everywhere

    Integrated Threat Defence

    Organizational Change

    Phase 1

    Se

    cu

    rity

    Re

    ad

    ine

    ss

    Phased Approach to Security Organizational Enablement

  • 2015 Cisco and/or its affiliates. All rights reserved.10

    Phase 1: Organizational Change

    Cultural Change Talent Pool

    Security to be engaged at boardroom level

    Personnel to be embedded into business units

    + =+

    Increase collaboration between work teams

    Direct or indirect revenue impact

    Invest in human capital

    Training and Up-skilling

    Enablement

    Renew corporate focus

    on Security

    New Metrics

  • 2015 Cisco and/or its affiliates. All rights reserved.11

    ENTERPRISE IT

    Email Security

    Web Security

    Advanced Mature

    Protection

    SecureRouting

    Firewall

    NGIPS

    Secure Access

    Businesses of all sizes must embed security into heart of network to achieve defense in depth.

    Ideally, solutions should move towards a converged model which minimize disparate point-product deployment

    A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats

    Phase 2: Solutions Convergence

  • 2015 Cisco and/or its affiliates. All rights reserved.12

    Phase 3: Security Everywhere across End Points and

    Extended Network

    Security Everywhere

    Extended Network

    End Points & Devices

    Core IT

    Network

    Mobile TelepresenceLaptops

    CloudData CenterBranch CampusEdgeOperationalTechnology

    Switches Routers Server DC Switch WirelessController

    Security EverywherePERVASIVE to persist

    across all attack vectors

    INTEGRATED To share

    information, intelligence, and

    capabilities

    CONTINOUS Allow for

    ongoing protection across full

    attack continuum

    1

    2

    3

    OPEN Option to integrate

    with third parties4

  • 2015 Cisco and/or its affiliates. All rights reserved.13

    End Vision: Integrated Threat Defense

    GLOBAL INTELLIGENCE ADVANCED MALWARE PROTECTION

    AGILE ARCHITECTURE AND PLATFORMS

    Threat Threat Threat Threat ResearchResearchResearchResearch

    Telemetry Telemetry Telemetry Telemetry DataDataDataData

    Advanced Advanced Advanced Advanced AlgorithmsAlgorithmsAlgorithmsAlgorithms

    Security EcosystemSecurity EcosystemSecurity EcosystemSecurity EcosystemContextual SharingContextual SharingContextual SharingContextual Sharing

    Accelerated Containment & RemediationAccelerated Containment & RemediationAccelerated Containment & RemediationAccelerated Containment & Remediation

    Open

    Continuous

    Integrated

    Pervasive

  • 2015 Cisco and/or its affiliates. All rights reserved.14

    Cisco can Accelerate your Digital Journey with Holistic

    Security Solutions

    Secure Access Mgmt.

    Advanced Malware

    Protection

    Cloud / DC Security

    Network Security

    PL

    AN

    Capabilities Assessment

    Architecture and Design

    Custom Threat Intelligence

    BU

    ILD Integration and Deployment

    Security Optimization and Migration

    Managed Threat Defense

    Remote Managed or Hosted ServicesRU

    N

  • 2015 Cisco and/or its affiliates. All rights reserved.15

    Looking Ahead into the Future: Canalys Top Predictions for

    2015

    Cybercrime will reach new levels

    Connected Things will create a major security loophole

    Mobile Payment systems will mean new threats

    DDoS attacks will target hosting and cloud providers

    Security gets C-Levels buy-in

    Increased level of regulation

    Security will shift from being technology-centric to platform-centric

    User will be at heart of every security strategy

  • 2015 Cisco and/or its affiliates. All rights reserved.16

    Embracing Change and Position for the Next Digital

    Disruption

    Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to

    provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated

    threats. John N.Stewart, Chief Security and Trust Officer Cisco

    Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of digital disruption known as Internet of Everything (IoE)

    Security is fundamental to the success of a companys digital strategy as all things get connected

    Security Everywhere enables organizations to be proactive in identifying and addressing cybersecurity risks