Security Everywhere: A Growth Engine for the Digital … Everywhere: A Growth Engine for the ... by...
Transcript of Security Everywhere: A Growth Engine for the Digital … Everywhere: A Growth Engine for the ... by...
Security Everywhere: A Growth Engine for the
Digital Economy
Caspar Herzberg
VP, Cisco Consulting Services, APJ+GC
September, 2015
14.10.2015 © 2015 Cisco and/or its affiliates. All rights reserved.
Technology has become Embedded in Modern Existence
We live in a digital world enabled
by complex technologies; but what
if technology “stopped working”?
A Hyper-Connected
Digital World
© 2015 Cisco and/or its affiliates. All rights reserved.2
Present: Internet of Things
50
2010 2015 2020
0
40
30
20
10
Bill
ion o
f D
evic
es
Bill
ion o
f D
evic
es
Bill
ion o
f D
evic
es
Bill
ion o
f D
evic
es
InflectionInflectionInflectionInflectionPointPointPointPoint
TimelineTimelineTimelineTimeline
World Population
50 Billion Connected Devices by 2020
12.5
25
6.8 7.2 7.6
Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony
Source: Cisco Internet of Things Report; Cisco Consulting Analysis © 2015 Cisco and/or its affiliates. All rights reserved.3
Future: From Internet of Things to Internet of Everything
© 2015 Cisco and/or its affiliates. All rights reserved.4
…combined with latest Disruptive Technologies
Mobile
Cloud
Security
Big Data
Social
Disruptive technologies that enable new business outcomes
Physical devices and objects connected to the internet
People, Process, Data and Technology gets interconnected to
deliver new business value
…make ‘Internet of Everything’ a new frontier of opportunities
Leveraging Data into More Useful Information for
Decision Making
Data
Delivering the Right Information to the Right Person (or Machine) at the Right Time
Process
Connecting People
in More Relevant, Valuable Ways
People
Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making
Things
c
Internet of Things already here today
By 2020, Every Business, Country and City will become a
Digital Enterprise
© 2015 Cisco and/or its affiliates. All rights reserved.5
Digital0100
1011
0100
010010110100
30%of these digitization
efforts will be successful if they
can reinvent themselves
By 2020,
75%of businesseswill become
fully digital or preparing to be
In 2015,
99.4% of the
physical world is unconnected
today
Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis
The “Bad Guys” are evolving – Cyberattacks are
increasingly Sophisticated and Dynamic
© 2015 Cisco and/or its affiliates. All rights reserved.6
20001990 1995 2005 2010 2015 2020
Viruses1990–2000
Worms2000–2005
Spyware 2005–Today
APTs CyberwareToday +
Industrialization of Hacking
Sophisticated Attacks
Phishing, Low Sophistication
75% of all attacks take only minutes to begin
data exfiltration
>50% of attacks persist without detection for
months or years before discovery
100% of companies connect to domains that
host malicious files or services
Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis
Dramatic Increase in Number and Scope of Security
Breaches
© 2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis
43M
29M
25M
23M
9M
2010 2011 2012 2013 2014
Total Number of Security Incidents
Number of detected incidents rose to 43M in 2014, a 48% increase from 2013
Since 2009, we have seen a 66% compounded annual growth rate of
detected incidents
2009
3M
Costs of Breaches amount to $20M+ for large companies in 2014, almost double
that of 2013
The more valuable data becomes, the more attractive hacking is to hackers
Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy
© 2015 Cisco and/or its affiliates. All rights reserved.8
Public SectorManufacturing EnergyFinancial Services Retail
Countries, Cities, Companies
Digital0100
1011
0100
Security
Next-Gen Network Architectures
Internet of Everything – People, Data, Processes and Things
IT
© 2015 Cisco and/or its affiliates. All rights reserved.9
Optimizing Security Readiness: How to Get There
Phase 2
Phase 3
End Vision
� Realign goals, refresh
human capital and
leadership
� Secure existing
enterprise IT network
i.e. routers, switches,
servers etc and move
towards an integrated
platform
� Pervasive, Integrated,
Continuous and Open
� Deploy solutions that
span across IT and
external networks
� Network seen as a
Sensor and Enforcer
� Global intelligence
based on advanced
algorithms
� 3rd Party Ecosystem
Open Source
� Advanced Malware
Protection
Everywhere
� Predictive, agile and
dynamic
SolutionsConvergence
Security Everywhere
Integrated Threat Defence
Organizational Change
Phase 1
Se
cu
rity
Re
ad
ine
ss
Phased Approach to Security Organizational Enablement
© 2015 Cisco and/or its affiliates. All rights reserved.10
Phase 1: Organizational Change
Cultural Change Talent Pool
� Security to be engaged at boardroom level
� Personnel to be embedded into business units
+ =+
� Increase collaboration between work teams
� Direct or indirect revenue impact
� Invest in human capital
� Training and Up-skilling
Enablement
Renew corporate focus
on Security
New Metrics
© 2015 Cisco and/or its affiliates. All rights reserved.11
ENTERPRISE IT
Email Security
Web Security
Advanced Mature
Protection
SecureRouting
Firewall
NGIPS
Secure Access
Businesses of all sizes must embed security into heart of network to achieve defense in depth.
Ideally, solutions should move towards a converged model which minimize disparate point-product deployment
A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats
Phase 2: Solutions Convergence
© 2015 Cisco and/or its affiliates. All rights reserved.12
Phase 3: Security Everywhere across End Points and
Extended Network
Security Everywhere
Extended Network
End Points & Devices
Core IT
Network
Mobile TelepresenceLaptops
CloudData CenterBranch CampusEdgeOperationalTechnology
Switches Routers Server DC Switch WirelessController
Security EverywherePERVASIVE – to persist
across all attack vectors
INTEGRATED – To share
information, intelligence, and
capabilities
CONTINOUS – Allow for
ongoing protection across full
attack continuum
1
2
3
OPEN – Option to integrate
with third parties4
© 2015 Cisco and/or its affiliates. All rights reserved.13
End Vision: Integrated Threat Defense
GLOBAL INTELLIGENCE ADVANCED MALWARE PROTECTION
AGILE ARCHITECTURE AND PLATFORMS
Threat Threat Threat Threat ResearchResearchResearchResearch
Telemetry Telemetry Telemetry Telemetry DataDataDataData
Advanced Advanced Advanced Advanced AlgorithmsAlgorithmsAlgorithmsAlgorithms
Security EcosystemSecurity EcosystemSecurity EcosystemSecurity EcosystemContextual SharingContextual SharingContextual SharingContextual Sharing
Accelerated Containment & RemediationAccelerated Containment & RemediationAccelerated Containment & RemediationAccelerated Containment & Remediation
Open
Continuous
Integrated
Pervasive
© 2015 Cisco and/or its affiliates. All rights reserved.14
Cisco can Accelerate your Digital Journey with Holistic
Security Solutions
Secure Access Mgmt.
Advanced Malware
Protection
Cloud / DC Security
Network Security
PL
AN
Capabilities Assessment
Architecture and Design
Custom Threat Intelligence
BU
ILD Integration and Deployment
Security Optimization and Migration
Managed Threat Defense
Remote Managed or Hosted ServicesRU
N
© 2015 Cisco and/or its affiliates. All rights reserved.15
Looking Ahead into the Future: Canalys Top Predictions for
2015
Cybercrime will reach new levels
Connected Things will create a major security loophole
Mobile Payment systems will mean new threats
DDoS attacks will target hosting and cloud providers
Security gets C-Levels buy-in
Increased level of regulation
Security will shift from being technology-centric to platform-centric
User will be at heart of every security strategy
© 2015 Cisco and/or its affiliates. All rights reserved.16
Embracing Change and Position for the Next Digital
Disruption
“Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to
provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated
threats.” John N.Stewart, Chief Security and Trust Officer Cisco
• Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of digital disruption known as Internet of Everything (IoE)
• Security is fundamental to the success of a company’s digital strategy as all ‘things’ get connected
• ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing cybersecurity risks