Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

New Opportunities, New Risks: The Internet of Things and Business Innovation

14,238 views

Published on

Cisco Annual Security Report 2015: http://www.cisco.com/web/offers/lp/2015-annual-security-report/index.html?keycode=000657684

Published in: Technology

New Opportunities, New Risks: The Internet of Things and Business Innovation

  1. 1. New Opportunities, New Risks: The Internet of Things and Business Innovation
  2. 2. The Internet of Things is expected to grow to approximately 50 billion things by 2020. Source: 2014 Mid-Year Security Report, Cisco
  3. 3. Click this button to tweet the information on each slide.
  4. 4. The Internet of Things is creating unprecedented opportunities for both individuals and organizations to gain greater value from networked connections among people, processes, data and things. Source: Blog, Cisco
  5. 5. There is greater potential that more personal information and business data will exist in the cloud. With that comes significant implications for applying proper security to protect the data and establishing privacy policies. Source: Blog, Cisco
  6. 6. According to the Ponemon Institute, the average cost of an organizational data breach was US$5.4 million in 2014, up from US$4.5 million in 2013. Source: 2014 Mid-Year Security Report, Cisco
  7. 7. The Center for Strategic and International Studies’ Estimating the Cost of Cyber Crime and Cyber Espionage report estimates that US$100 billion is lost annually to the US economy, and as many as 508,000 US jobs are lost, because of malicious online activity. Source: 2014 Mid-Year Security Report, Cisco
  8. 8. New Risks • IoT devices spreading malware 26% voiced a concern that these devices could spread malware to companies, or be the subject to denial-of-service attacks • Privacy When adversaries reach a point where they begin correlating information from different sources, they will be able to gain a much bigger picture about users • Forgotten assets The pressing concern of the growing population of abandoned and unmanaged Internet-connected devices
  9. 9. Cisco security researchers found that malicious traffic was visible on 100 percent of the networks sampled. Source: 2014 Mid-Year Security Report, Cisco
  10. 10. To combat these threats across the entire attack continuum — before, during, and after an attack, organizations need pervasive protection across a broad range of attack vectors. Source: Blog, Cisco
  11. 11. New Opportunities • Visibility-driven The more we see, the more we can correlate information and apply intelligence to make better decisions and take action • Threat-centric Real-time security intelligence can be delivered from the cloud and shared across all security solutions to detect and remediate threats • Platform-based Security requires an integrated system of agile and open platforms that cover network devices and the cloud
  12. 12. More about opportunities and risks in this new era: Download the Cisco Annual Security Report 2015

×