Transcript

Ever-expanding connectivity as a result of modern networks is

transforming our world.

According to the Global Center for Digital Business Transformation

(DBT Center):

4 of today’s top 10 incumbents

(in terms of market share) in each industry will be displaced by digital disruption in the next

5 years.Source: Global Center for Digital Business Transformation, IMD and Cisco

The Internet of Everything (IoE) is

generating unprecedented

opportunities for networked connections

among people, processes, data,

and things.

19 trillionvalueSource: http://ioeassessment.cisco.com/learn, Cisco

We are now facing a similar evolution with respect to security. Security must be everywhere — embedded into the heart of the intelligent network infrastructure and spanning throughout the extended network.

In a recent IoT Survey by Cisco Consulting Services that included 1,230 customers globally, when asked …

“What are the biggest drawbacks of adopting IoT solutions in your

organization?”Customers answered…

“Threats to the privacy of our workers

and/or customers”

“Threats to IT or

physical security”

Source: “Attaining IoT Value: How To Move from Connecting Things to Capturing Insights,” Cisco, December 2014

Security needs to be as pervasive as the IoE itself.

Security needs to be as pervasive as the IoE

itself.

While creating incredible opportunity this

digital transformation also presents new challenges…

Attack vectors will increase

65% of companies said they couldn’t stop a breach because it evaded existing

preventative measures

33% of companies took more than 2 years to discover the breach

55% of companies couldn’t identify where the breach occurred

Source: 2014: Year of Mega Breaches, Ponemon, 2015

Contextual data is more valuable

The more valuable data/insight becomes, the more attractive

hacking becomes

New security challenges will arise

Implication The increasing value of data

is fueling a high-growth hacker economy

Attackers have increased their understanding

Hackers relentlessly drive attacks home, using tools developed

specifically to circumvent chosen security infrastructures

CEO’s Top Challenges

Threat to data

42%

Inability of IT to keep

pace with change

38%

Regulatory challenges

32%Source: Cisco Consulting Services, 2012

Lawsuits

Security breaches will be increasingly costly to businesses in the following ways:

Revenue

Intellectual property

Brand image

Average cost of data breach in 2014

Average cost of data breach in 2013

$5.4 million

$4.5 million

Source: Ponemon Institute, 2014

Embedding security everywhere allows security to

become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the IoE.


Recommended