17
Security Everywhere: A Growth Engine for the Digital Economy Caspar Herzberg VP, Cisco Consulting Services, APJ+GC September, 2015 06.10.2015 © 2015 Cisco and/or its affiliates. All rights reserved.

Security Everywhere: A Growth Engine for the Digital Economy

Embed Size (px)

Citation preview

Security Everywhere: A Growth Engine for the

Digital Economy

Caspar Herzberg

VP, Cisco Consulting Services, APJ+GC

September, 2015

06.10.2015 © 2015 Cisco and/or its affiliates. All rights reserved.

Technology has become Embedded in Modern Existence

We live in a digital world enabled

by complex technologies; but what

if technology “stopped working”?

A Hyper-

Connected

Digital World

© 2015 Cisco and/or its affiliates. All rights reserved.2

Present: Internet of Things

50

2010 2015 2020

0

40

30

20

10

Bill

ion o

f D

evic

es

InflectionPoint

Timeline

World Population

50 Billion Connected

Devices by 2020

12.5

25

6.8 7.2 7.6

Adoption rate of Digital

infrastructure: 5x faster

than electricity and

Telephony

Source: Cisco Internet of Things Report; Cisco Consulting Analysis © 2015 Cisco and/or its affiliates. All rights reserved.3

Future: From Internet of Things to Internet of Everything

© 2015 Cisco and/or its affiliates. All rights reserved.4

…combined with latest

Disruptive Technologies

Disruptive technologies that enable

new business outcomes

Physical devices and objects

connected to the internetPeople, Process, Data and

Technology gets interconnected to

deliver new business value

…make ‘Internet of Everything’ a

new frontier of opportunities

c

Internet of Things

already here today

By 2020, Every Business, Country and City will become a Digital Enterprise

© 2015 Cisco and/or its affiliates. All rights reserved.5

Digital0100

1011

0100

0100

1011

0100

30%of these digitization

efforts will be successful if they

can reinvent themselves

By 2020,

75%of businesseswill become

fully digital or preparing to be

In 2015,

99.4% of the

physical world is

unconnected

today

Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis

The “Bad Guys” are evolving – Cyberattacks are increasingly Sophisticated and Dynamic

© 2015 Cisco and/or its affiliates. All rights reserved.6

20001990 1995 2005 2010 2015 2020

Viruses

1990–2000

Worms

2000–2005

Spyware 2005–Today

APTs Cyberware

Today +

Industrialization of Hacking

Sophisticated Attacks

Phishing, Low Sophistication

75% of all attacks take

only minutes to begin

data exfiltration

>50% of attacks persist

without detection for

months or years before

discovery

100% of companies

connect to domains that

host malicious files or

services

Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis

Dramatic Increase in Number and Scope of Security Breaches

© 2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis

43M

29M

25M

23M

9M

2010 2011 2012 2013 2014

Total Number of Security Incidents

Number of detected incidents rose to

43M in 2014, a 48% increase from 2013

Since 2009, we have seen a 66%

compounded annual growth rate of

detected incidents

2009

3M

Costs of Breaches amount to $20M+ for

large companies in 2014, almost double

that of 2013

The more valuable data becomes, the

more attractive hacking is to hackers

Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy

© 2015 Cisco and/or its affiliates. All rights reserved.8

Public SectorManufacturing EnergyFinancial Services Retail

Countries, Cities, Companies

Digital0100

1011

0100

Security

Next-Gen Network Architectures

Internet of Everything – People, Data, Processes and Things

IT

© 2015 Cisco and/or its affiliates. All rights reserved.9

Optimizing Security Readiness: How to Get There

Phase 2

Phase 3

End Vision

Realign goals, refresh

human capital and

leadership

Secure existing

enterprise IT network

i.e. routers, switches,

servers etc and move

towards an integrated

platform

Pervasive, Integrated,

Continuous and Open

Deploy solutions that

span across IT and

external networks

Network seen as a

Sensor and Enforcer

Global intelligence

based on advanced

algorithms

3rd Party Ecosystem

Open Source

Advanced Malware

Protection

Everywhere

Predictive, agile and

dynamic

Solutions

Convergence

Security

Everywhere

Integrated Threat

Defence

Organizational

Change

Phase 1

Se

cu

rity

Re

ad

ine

ss

Phased Approach to Security Organizational Enablement

© 2015 Cisco and/or its affiliates. All rights reserved.10

Phase 1: Organizational Change

Cultural Change Talent Pool

Security to be engaged at boardroom level

Personnel to be embedded into business units

+ =+

Increase collaboration between work teams

Direct or indirect revenue impact

Invest in human capital

Training and Up-skilling

Enablement

Renew corporate focus

on Security

New Metrics

© 2015 Cisco and/or its affiliates. All rights reserved.11

ENTERPRISE IT

Email

Security

Web

Security

Advanced

Mature

Protection

SecureRouting

Firewall

NGIPS

Secure Access

Businesses of all sizes must embed security into heart of network to achieve defense in depth.

Ideally, solutions should move towards a converged model which minimize disparate point-product deployment

A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats

Phase 2: Solutions Convergence

© 2015 Cisco and/or its affiliates. All rights reserved.12

Phase 3: Security Everywhere across End Points and Extended Network

Security Everywhere

Extended

Network

End Points

& Devices

Core IT

Network

Mobile TelepresenceLaptops

CloudData CenterBranch CampusEdgeOperational

Technology

Switches Routers Server DC Switch Wireless

Controller

Security EverywherePERVASIVE – to persist

across all attack vectors

INTEGRATED – To share

information, intelligence, and

capabilities

CONTINOUS – Allow for

ongoing protection across full

attack continuum

1

2

3

OPEN – Option to integrate

with third parties4

© 2015 Cisco and/or its affiliates. All rights reserved.13

End Vision: Integrated Threat Defense

GLOBAL INTELLIGENCE ADVANCED MALWARE

PROTECTION

AGILE ARCHITECTURE AND

PLATFORMS

Threat Research

Telemetry Data

Advanced Algorithms

Security EcosystemContextual Sharing

Accelerated Containment & Remediation

Open

Continuous

Integrated

Pervasive

© 2015 Cisco and/or its affiliates. All rights reserved.14

Cisco can Accelerate your Digital Journey with Holistic Security Solutions

Secure

Access

Mgmt.

Advanced

Malware

Protection

Cloud / DC

SecurityNetwork

Security

PL

AN

Capabilities Assessment

Architecture and Design

Custom Threat Intelligence

BU

ILD Integration and Deployment

Security Optimization and Migration

Managed Threat Defense

Remote Managed or Hosted ServicesRU

N

© 2015 Cisco and/or its affiliates. All rights reserved.15

Looking Ahead into the Future: Canalys Top Predictions for 2015

Cybercrime will reach new levels

Connected Things will create a major security loophole

Mobile Payment systems will mean new threats

DDoS attacks will target hosting and cloud providers

Security gets C-Levels buy-in

Increased level of regulation

Security will shift from being technology-centric to platform-centric

User will be at heart of every security strategy

© 2015 Cisco and/or its affiliates. All rights reserved.16

Embracing Change and Position for the Next Digital Disruption

“Organizations no longer want to accept that compromise is

inevitable. They are looking to the security industry to

provide them with products that are reliable and resilient,

and capable of deflecting even the most sophisticated

threats.” John N.Stewart, Chief Security and Trust Officer Cisco

• Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of digital disruption known as Internet of Everything (IoE)

• Security is fundamental to the success of a company’s digital strategy as all ‘things’ get connected

• ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing cybersecurity risks