Security Everywhere: A Growth Engine for the Digital Economy

Security Everywhere: A Growth Engine for the Digital Economy Caspar Herzberg VP, Cisco Consulting Services, APJ+GC September, 2015 14.10.2015 © 2015...
3 downloads 0 Views 3MB Size
Security Everywhere: A Growth Engine for the Digital Economy Caspar Herzberg VP, Cisco Consulting Services, APJ+GC September, 2015

14.10.2015

© 2015 Cisco and/or its affiliates. All rights reserved.

Technology has become Embedded in Modern Existence

A HyperConnected Digital World

2

We live in a digital world enabled by complex technologies; but what if technology “stopped working”?

© 2015 Cisco and/or its affiliates. All rights reserved.

Present: Internet of Things 50

50 Billion Connected Devices by 2020

30

20

Billion of Devices

40 Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony 25 Inflection Point

12.5

10 6.8 0

7.6

Timeline 2010

3

7.2

Source: Cisco Internet of Things Report; Cisco Consulting Analysis

2015

2020 © 2015 Cisco and/or its affiliates. All rights reserved.

World Population

Future: From Internet of Things to Internet of Everything

Internet of Things already here today

…combined with latest Disruptive Technologies

Cloud

c

…make ‘Internet of Everything’ a new frontier of opportunities

People

Mobile Big Data

Connecting People in More Relevant, Valuable Ways

Data

Social

Leveraging Data into More Useful Information for Decision Making

Process Delivering the Right Information to the Right Person (or Machine) at the Right Time

Things Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making

Security

Physical devices and objects connected to the internet

4

Disruptive technologies that enable new business outcomes

People, Process, Data and Technology gets interconnected to deliver new business value

© 2015 Cisco and/or its affiliates. All rights reserved.

By 2020, Every Business, Country and City will become a Digital Enterprise 0100 1011 0100

Digital

0100 1011 0100

5

In 2015,

By 2020,

99.4% of the

75%

physical world is unconnected today

Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis

of businesses will become fully digital or preparing to be

30% of these digitization efforts will be successful if they can reinvent themselves

© 2015 Cisco and/or its affiliates. All rights reserved.

The “Bad Guys” are evolving – Cyberattacks are increasingly Sophisticated and Dynamic 75% of all attacks take only minutes to begin data exfiltration

Sophisticated Attacks

>50% of attacks persist without detection for months or years before discovery

Industrialization of Hacking

Phishing, Low Sophistication

1990 Viruses 1990–2000 6

1995

100% of companies connect to domains that host malicious files or services 2000 Worms 2000–2005

2005 Spyware 2005–Today

Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis

2010

2015

2020

APTs Cyberware Today + © 2015 Cisco and/or its affiliates. All rights reserved.

Dramatic Increase in Number and Scope of Security Breaches 43M 29M

Number of detected incidents rose to 43M in 2014, a 48% increase from 2013 Since 2009, we have seen a 66% compounded annual growth rate of detected incidents

25M 23M

Costs of Breaches amount to $20M+ for large companies in 2014, almost double that of 2013

9M 3M

2009

2010

2011

2012

2013

2014

The more valuable data becomes, the more attractive hacking is to hackers

Total Number of Security Incidents

7

Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis

© 2015 Cisco and/or its affiliates. All rights reserved.

Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy

0100 1011 0100

Digital Internet of Everything – People, Data, Processes and Things Countries, Cities, Companies

Manufacturing

IT

Financial Services

Public Sector

Energy

Next-Gen Network Architectures Security

8

© 2015 Cisco and/or its affiliates. All rights reserved.

Retail

Optimizing Security Readiness: How to Get There End Vision

Security Readiness

Phase 3

Phase 2 Phase 1 Organizational Change Realign goals, refresh human capital and leadership

Solutions Convergence Secure existing enterprise IT network i.e. routers, switches, servers etc and move towards an integrated platform

Security Everywhere Pervasive, Integrated, Continuous and Open Deploy solutions that span across IT and external networks Network seen as a Sensor and Enforcer

Integrated Threat Defence

Global intelligence based on advanced algorithms 3rd Party Ecosystem Open Source Advanced Malware Protection Everywhere Predictive, agile and dynamic

Phased Approach to Security Organizational Enablement

9

© 2015 Cisco and/or its affiliates. All rights reserved.

Phase 1: Organizational Change

Cultural Change

+

+

10

Talent Pool

New Metrics

Security to be engaged at boardroom level

Increase collaboration between work teams

Personnel to be embedded into business units

Direct or indirect revenue impact

Enablement

= Invest in human capital Training and Up-skilling

Renew corporate focus on Security

© 2015 Cisco and/or its affiliates. All rights reserved.

Phase 2: Solutions Convergence

Secure Routing

Firewall

Email Security

NGIPS

Ideally, solutions should move towards a converged model which minimize disparate point-product deployment

Web Security

A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats

ENTERPRISE IT

Secure Access

11

Advanced Mature Protection

Businesses of all sizes must embed security into heart of network to achieve defense in depth.

© 2015 Cisco and/or its affiliates. All rights reserved.

Phase 3: Security Everywhere across End Points and Extended Network Security Everywhere

Security Everywhere End Points & Devices

Mobile

Extended Network Branch

Core IT Network

12

Switches

Edge

Laptops

Campus

Routers

Telepresence

Data Center

Server

Cloud

DC Switch

Operational Technology

Wireless Controller

1

PERVASIVE – to persist across all attack vectors

2

INTEGRATED – To share information, intelligence, and capabilities

3

CONTINOUS – Allow for ongoing protection across full attack continuum

4

OPEN – Option to integrate with third parties

© 2015 Cisco and/or its affiliates. All rights reserved.

End Vision: Integrated Threat Defense AGILE ARCHITECTURE AND PLATFORMS GLOBAL INTELLIGENCE

Open

Telemetry Data

Integrated

Threat Research

Continuous

13

ADVANCED MALWARE PROTECTION

Advanced Algorithms

Security Ecosystem Contextual Sharing Accelerated Containment & Remediation

Pervasive

© 2015 Cisco and/or its affiliates. All rights reserved.

Cisco can Accelerate your Digital Journey with Holistic Security Solutions

PLAN

Network Security

Cloud / DC Security

Advanced Malware Protection

Capabilities Assessment Architecture and Design

RUN

BUILD

Custom Threat Intelligence

14

Integration and Deployment Security Optimization and Migration Managed Threat Defense Remote Managed or Hosted Services

© 2015 Cisco and/or its affiliates. All rights reserved.

Secure Access Mgmt.

Looking Ahead into the Future: Canalys Top Predictions for 2015 Cybercrime will reach new levels Connected Things will create a major security loophole Mobile Payment systems will mean new threats DDoS attacks will target hosting and cloud providers Increased level of regulation User will be at heart of every security strategy Security will shift from being technology-centric to platform-centric Security gets C-Levels buy-in 15

© 2015 Cisco and/or its affiliates. All rights reserved.

Embracing Change and Position for the Next Digital Disruption • Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of

digital disruption known as Internet of Everything (IoE) • Security is fundamental to the success of a company’s digital strategy as all ‘things’ get

connected • ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing

cybersecurity risks

“Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated threats.” John N.Stewart, Chief Security and Trust Officer Cisco

16

© 2015 Cisco and/or its affiliates. All rights reserved.

Suggest Documents