Security Everywhere: A Growth Engine for the Digital Economy Caspar Herzberg VP, Cisco Consulting Services, APJ+GC September, 2015
14.10.2015
© 2015 Cisco and/or its affiliates. All rights reserved.
Technology has become Embedded in Modern Existence
A HyperConnected Digital World
2
We live in a digital world enabled by complex technologies; but what if technology “stopped working”?
© 2015 Cisco and/or its affiliates. All rights reserved.
Present: Internet of Things 50
50 Billion Connected Devices by 2020
30
20
Billion of Devices
40 Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony 25 Inflection Point
12.5
10 6.8 0
7.6
Timeline 2010
3
7.2
Source: Cisco Internet of Things Report; Cisco Consulting Analysis
2015
2020 © 2015 Cisco and/or its affiliates. All rights reserved.
World Population
Future: From Internet of Things to Internet of Everything
Internet of Things already here today
…combined with latest Disruptive Technologies
Cloud
c
…make ‘Internet of Everything’ a new frontier of opportunities
People
Mobile Big Data
Connecting People in More Relevant, Valuable Ways
Data
Social
Leveraging Data into More Useful Information for Decision Making
Process Delivering the Right Information to the Right Person (or Machine) at the Right Time
Things Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making
Security
Physical devices and objects connected to the internet
4
Disruptive technologies that enable new business outcomes
People, Process, Data and Technology gets interconnected to deliver new business value
© 2015 Cisco and/or its affiliates. All rights reserved.
By 2020, Every Business, Country and City will become a Digital Enterprise 0100 1011 0100
Digital
0100 1011 0100
5
In 2015,
By 2020,
99.4% of the
75%
physical world is unconnected today
Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis
of businesses will become fully digital or preparing to be
30% of these digitization efforts will be successful if they can reinvent themselves
© 2015 Cisco and/or its affiliates. All rights reserved.
The “Bad Guys” are evolving – Cyberattacks are increasingly Sophisticated and Dynamic 75% of all attacks take only minutes to begin data exfiltration
Sophisticated Attacks
>50% of attacks persist without detection for months or years before discovery
Industrialization of Hacking
Phishing, Low Sophistication
1990 Viruses 1990–2000 6
1995
100% of companies connect to domains that host malicious files or services 2000 Worms 2000–2005
2005 Spyware 2005–Today
Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis
2010
2015
2020
APTs Cyberware Today + © 2015 Cisco and/or its affiliates. All rights reserved.
Dramatic Increase in Number and Scope of Security Breaches 43M 29M
Number of detected incidents rose to 43M in 2014, a 48% increase from 2013 Since 2009, we have seen a 66% compounded annual growth rate of detected incidents
25M 23M
Costs of Breaches amount to $20M+ for large companies in 2014, almost double that of 2013
9M 3M
2009
2010
2011
2012
2013
2014
The more valuable data becomes, the more attractive hacking is to hackers
Total Number of Security Incidents
7
Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis
© 2015 Cisco and/or its affiliates. All rights reserved.
Achieving Cyber Resilience in Internet of Everything Era Security is fundamental to the success of a company's digital strategy
0100 1011 0100
Digital Internet of Everything – People, Data, Processes and Things Countries, Cities, Companies
Manufacturing
IT
Financial Services
Public Sector
Energy
Next-Gen Network Architectures Security
8
© 2015 Cisco and/or its affiliates. All rights reserved.
Retail
Optimizing Security Readiness: How to Get There End Vision
Security Readiness
Phase 3
Phase 2 Phase 1 Organizational Change Realign goals, refresh human capital and leadership
Solutions Convergence Secure existing enterprise IT network i.e. routers, switches, servers etc and move towards an integrated platform
Security Everywhere Pervasive, Integrated, Continuous and Open Deploy solutions that span across IT and external networks Network seen as a Sensor and Enforcer
Integrated Threat Defence
Global intelligence based on advanced algorithms 3rd Party Ecosystem Open Source Advanced Malware Protection Everywhere Predictive, agile and dynamic
Phased Approach to Security Organizational Enablement
9
© 2015 Cisco and/or its affiliates. All rights reserved.
Phase 1: Organizational Change
Cultural Change
+
+
10
Talent Pool
New Metrics
Security to be engaged at boardroom level
Increase collaboration between work teams
Personnel to be embedded into business units
Direct or indirect revenue impact
Enablement
= Invest in human capital Training and Up-skilling
Renew corporate focus on Security
© 2015 Cisco and/or its affiliates. All rights reserved.
Phase 2: Solutions Convergence
Secure Routing
Firewall
Email Security
NGIPS
Ideally, solutions should move towards a converged model which minimize disparate point-product deployment
Web Security
A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats
ENTERPRISE IT
Secure Access
11
Advanced Mature Protection
Businesses of all sizes must embed security into heart of network to achieve defense in depth.
© 2015 Cisco and/or its affiliates. All rights reserved.
Phase 3: Security Everywhere across End Points and Extended Network Security Everywhere
Security Everywhere End Points & Devices
Mobile
Extended Network Branch
Core IT Network
12
Switches
Edge
Laptops
Campus
Routers
Telepresence
Data Center
Server
Cloud
DC Switch
Operational Technology
Wireless Controller
1
PERVASIVE – to persist across all attack vectors
2
INTEGRATED – To share information, intelligence, and capabilities
3
CONTINOUS – Allow for ongoing protection across full attack continuum
4
OPEN – Option to integrate with third parties
© 2015 Cisco and/or its affiliates. All rights reserved.
End Vision: Integrated Threat Defense AGILE ARCHITECTURE AND PLATFORMS GLOBAL INTELLIGENCE
Open
Telemetry Data
Integrated
Threat Research
Continuous
13
ADVANCED MALWARE PROTECTION
Advanced Algorithms
Security Ecosystem Contextual Sharing Accelerated Containment & Remediation
Pervasive
© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco can Accelerate your Digital Journey with Holistic Security Solutions
PLAN
Network Security
Cloud / DC Security
Advanced Malware Protection
Capabilities Assessment Architecture and Design
RUN
BUILD
Custom Threat Intelligence
14
Integration and Deployment Security Optimization and Migration Managed Threat Defense Remote Managed or Hosted Services
© 2015 Cisco and/or its affiliates. All rights reserved.
Secure Access Mgmt.
Looking Ahead into the Future: Canalys Top Predictions for 2015 Cybercrime will reach new levels Connected Things will create a major security loophole Mobile Payment systems will mean new threats DDoS attacks will target hosting and cloud providers Increased level of regulation User will be at heart of every security strategy Security will shift from being technology-centric to platform-centric Security gets C-Levels buy-in 15
© 2015 Cisco and/or its affiliates. All rights reserved.
Embracing Change and Position for the Next Digital Disruption • Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of
digital disruption known as Internet of Everything (IoE) • Security is fundamental to the success of a company’s digital strategy as all ‘things’ get
connected • ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing
cybersecurity risks
“Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated threats.” John N.Stewart, Chief Security and Trust Officer Cisco
16
© 2015 Cisco and/or its affiliates. All rights reserved.