Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Ever-expanding connectivity
as a result of modern
networks is transforming
our world.
According to the Global Center for Digital
Business Transformation (DBT Center):
4 of today’s top 10 incumbents
(in terms ...
The Internet of
Everything (IoE) is
generating unprecedented
opportunities for
networked connections
among people,
process...
We are now facing a similar evolution
with respect to security. Security
must be everywhere —
embedded into the heart of t...
In a recent IoT Survey by Cisco Consulting Services that
included 1,230 customers globally, when asked …
“What are the big...
Security needs to be as
pervasive as the IoE
itself.
Security needs to be as
pervasive as the IoE itself.
While creating incredible
opportunity this
digital transformation also
presents new challenges…
Attack vectors will increase
65% of companies said they couldn’t stop a breach
because it evaded existing preventative mea...
Contextual data is
more valuable
The more valuable data/insight
becomes, the more attractive
hacking becomes
New security ...
CEO’s Top Challenges
Threat to data
42%
Inability of IT to keep
pace with change
38%
Regulatory
challenges
32% Source: Cis...
Lawsuits
Security breaches will be increasingly
costly to businesses in the following ways:
Revenue
Intellectual
property
...
Average cost of data
breach in 2014
Average cost of data
breach in 2013
$5.4 million
$4.5 million
Source: Ponemon Institut...
Embedding security everywhere
allows security to become an enabler for
businesses to take full and secure
advantage of opp...
Download the Security Whitepaper Download the Midyear Security Report
See how digital transformation
is fueling the next w...
Security Everywhere in the Digital Economy
Upcoming SlideShare
Loading in …5
×

Security Everywhere in the Digital Economy

560,617 views

Published on

Are you ready for the next wave of security threats? http://www.cisco.com/c/r/en/us/internet-of-everything-ioe/security/vision/index.html

Published in: Technology

Security Everywhere in the Digital Economy

  1. 1. Ever-expanding connectivity as a result of modern networks is transforming our world.
  2. 2. According to the Global Center for Digital Business Transformation (DBT Center): 4 of today’s top 10 incumbents (in terms of market share) in each industry will be displaced by digital disruption in the next 5 years. Source: Global Center for Digital Business Transformation, IMD and Cisco
  3. 3. The Internet of Everything (IoE) is generating unprecedented opportunities for networked connections among people, processes, data, and things. 19 trillion value Source: http://ioeassessment.cisco.com/learn, Cisco
  4. 4. We are now facing a similar evolution with respect to security. Security must be everywhere — embedded into the heart of the intelligent network infrastructure and spanning throughout the extended network.
  5. 5. In a recent IoT Survey by Cisco Consulting Services that included 1,230 customers globally, when asked … “What are the biggest drawbacks of adopting IoT solutions in your organization?” Customers answered… “Threats to the privacy of our workers and/or customers” “Threats to IT or physical security” Source: “Attaining IoT Value: How To Move from Connecting Things to Capturing Insights,” Cisco, December 2014
  6. 6. Security needs to be as pervasive as the IoE itself. Security needs to be as pervasive as the IoE itself.
  7. 7. While creating incredible opportunity this digital transformation also presents new challenges…
  8. 8. Attack vectors will increase 65% of companies said they couldn’t stop a breach because it evaded existing preventative measures 33% of companies took more than 2 years to discover the breach 55% of companies couldn’t identify where the breach occurred Source: 2014: Year of Mega Breaches, Ponemon, 2015
  9. 9. Contextual data is more valuable The more valuable data/insight becomes, the more attractive hacking becomes New security challenges will arise Implication The increasing value of data is fueling a high-growth hacker economy Attackers have increased their understanding Hackers relentlessly drive attacks home, using tools developed specifically to circumvent chosen security infrastructures
  10. 10. CEO’s Top Challenges Threat to data 42% Inability of IT to keep pace with change 38% Regulatory challenges 32% Source: Cisco Consulting Services, 2012
  11. 11. Lawsuits Security breaches will be increasingly costly to businesses in the following ways: Revenue Intellectual property Brand image
  12. 12. Average cost of data breach in 2014 Average cost of data breach in 2013 $5.4 million $4.5 million Source: Ponemon Institute, 2014
  13. 13. Embedding security everywhere allows security to become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the IoE.
  14. 14. Download the Security Whitepaper Download the Midyear Security Report See how digital transformation is fueling the next wave of the Internet

×