SlideShare a Scribd company logo
January 2016
Cisco 2016
Annual Security Report
Rafael Chavez
Cisco Mexico
Security Sales Manager
The Rise of Digitization is Upon Us
2015 2014 2013
16 billion web requests a day
500 billion emails a day
In aggregate, block almost 20 billion threats per day
• More than 1.1 million unique malware samples daily
18.5 billion AMP queries
A View Across Cisco’s Global Telemetry
Over 2400
Respondents
• CSOs 45%
SecOps 55%
• Large Enterprise 13%
Enterprise 38%
Midmarket 49%
Cisco’s 2015 Security Capabilities Benchmark Study
Conducted
over the
Summer of 2015
Study Included
12 Countries
US
Mexico
Brazil
UK
France
Germany
Italy
Russia
India
Australia
China
Japan
Security Concerns Weigh on the Minds of Executives
Of Executives Very Concerned
About Security
Agreed More Information
Will Be Expected
48%
92%
Much More Concerned
Than 3 Years Ago
41%
Direct Attacks Generate Big Profits
More efficient and more lucrative
DNS: Auld Acquaintance Be Forgot
91.3%of malware uses DNS
68%of organizations
don’t monitor it
A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic
Constraints: Budget, Compatibility, and Certification
Security teams may be limited in their ability to carry out their plans
Maturity Levels – Cisco Security Report 2015
Current Threat Landscape
• Attackers and attacks continue
to be effective
• Defender concern
spurring action
• Regions respond to uncertain
Internet governance
• Fragmented response inhibits
an effective defense.
Industrialization of Cybercrime
Inside the Attacks
Professional Attack Infrastructure
Designed to evade and reconstitute
Browser Infections Persist
More than
85%of the companies studied
were affected each month
Confidence is declining, but awareness is driving action
Inside the Defenses
Mixed Confidence in Defense Capabilities
59%confident in having the
latest technology
51%have strong confidence in
ability to detect a security
weakness in advance
54%have strong confidence
in ability to defend
against attacks
45%have strong confidence
in ability to scope and
contain an attack
54%have strong confidence in
ability to verify an attack
56%review security policies
on a regular basis
-5% +0% -4%
-1% +0% +0%
Inherent Risk in the Infrastructure
of devices surveyed across the
Internet were running known
vulnerabilities with an average
of 26 each
of devices surveyed across the
Internet were End of Service
of devices surveyed across the
Internet were End of Life
92%
31%
5%
Security Awareness and Training
Formal Written Policies
Outsource Audit and Consulting
Outsource Incident Response
Outsource Threat Intelligence
Defenders are Responding
More organizations are taking actions to become more prepared for what’s going to happen.
90%
66%
52%
42%
39%
+1%
+7%
+1%
+7%
N/A
Encrypted Traffic: A Sign of the Times
Individual Privacy Government Compliance
Organization Security
Encrypted Traffic is Increasing
It represents over 50% of bytes transferred
https://
The growing trend of web encryption creates false sense of security and blind spots for defenders
Collaboration is Critical
Actionable collaboration is needed
between people, processes, and
technology, and on the back-end
infrastructure that attackers are using.
Processes
People
Technology
Trust, But Verify
Technology vendors need to demonstrate trustworthiness by:
Creating a
Security-Aware
Culture
Providing Rapid
Remediation
Responding to
Breaches
Quickly
Following
Policies and
Processes
Building
Security Into
Their Solutions
1. Richer network and security architecture needed
2. Best-in-class technology alone cannot deal with threat landscape
3. Integrated threat defense can converge on encrypted malicious activities
4. Open APIs are crucial
5. Requires less gear and software to install and manage
6. Automation and coordination aspects help to reduce TTD, containment,
and remediation
Six Tenets of an Integrated Threat Defense
2016 Annual Security Report
Attackers are tapping into
legitimate resources, becoming
adept at deploying hard-to-detect
and highly profitable campaigns
Defenders confidence is
declining, but awareness
is driving action to
deploy new strategies
Collaboration is needed to
combat today’s innovative and
persistent attacks and develop
architecture for tomorrow
Thank You

More Related Content

What's hot

Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Sarah Vanier
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Proofpoint
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
Proofpoint
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Proofpoint
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
Doug Copley
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
Paul McGillicuddy
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
Netpluz Asia Pte Ltd
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
Proofpoint
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
EC-Council
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
Rodrigo Varas
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
ISACA
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Phil Huggins FBCS CITP
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
Phil Huggins FBCS CITP
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
wardell henley
 
Sample Incident Response Plan
Sample Incident Response PlanSample Incident Response Plan
Sample Incident Response Plan
Matthew J McMahon
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
Atlantic Security Conference
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
DevOps.com
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 
To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security
Catherine Arizan
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 

What's hot (20)

Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
Sample Incident Response Plan
Sample Incident Response PlanSample Incident Response Plan
Sample Incident Response Plan
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 

Viewers also liked

Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
 
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
Cisco DevNet
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
The Internet of Things
 
Firewall
FirewallFirewall
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Q1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondQ1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and Beyond
Black Duck by Synopsys
 
Presupuestos de una empresa y rentabilidad combinanda
Presupuestos de una empresa y rentabilidad combinandaPresupuestos de una empresa y rentabilidad combinanda
Presupuestos de una empresa y rentabilidad combinanda
Programador_28
 
Monitoreo y-gestion-de-redes
Monitoreo y-gestion-de-redesMonitoreo y-gestion-de-redes
Monitoreo y-gestion-de-redes
Fernando Toc
 
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,Fernanda Ramírez
 
seguridad en telecomunicaciones
seguridad en telecomunicacionesseguridad en telecomunicaciones
seguridad en telecomunicaciones
Inez Velazquez Hernandez
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
Bill Chamberlin
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Neha Gupta
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
DImension Data
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
 
Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4
Nathan Pacer
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
Tableau Software
 

Viewers also liked (20)

Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Firewall
FirewallFirewall
Firewall
 
U.3 .- Seguridad en redes de comunicación.
U.3 .- Seguridad en redes de comunicación.U.3 .- Seguridad en redes de comunicación.
U.3 .- Seguridad en redes de comunicación.
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Q1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondQ1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and Beyond
 
Presupuestos de una empresa y rentabilidad combinanda
Presupuestos de una empresa y rentabilidad combinandaPresupuestos de una empresa y rentabilidad combinanda
Presupuestos de una empresa y rentabilidad combinanda
 
Monitoreo y-gestion-de-redes
Monitoreo y-gestion-de-redesMonitoreo y-gestion-de-redes
Monitoreo y-gestion-de-redes
 
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
 
seguridad en telecomunicaciones
seguridad en telecomunicacionesseguridad en telecomunicaciones
seguridad en telecomunicaciones
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 

Similar to Reporte de Seguridad de Cisco 2016

Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Qualys
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
Abhishek Sood
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
CompTIA
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018
African Cyber Security Summit
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
Gartner Peer Insights
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, Scudieri
Anthony Scudieri
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)
Robert Greer
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
BeyondTrust
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
DImension Data
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
Bob Wall
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
Rahul Neel Mani
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
 

Similar to Reporte de Seguridad de Cisco 2016 (20)

Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, Scudieri
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 

More from Oscar Romano

Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDCEstudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Oscar Romano
 
VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016
Oscar Romano
 
Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016
Oscar Romano
 
Conectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXIConectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXI
Oscar Romano
 
Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)
Oscar Romano
 
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 "Transformación digital. Redes listas para la Era de la Internet de las Cosas" "Transformación digital. Redes listas para la Era de la Internet de las Cosas"
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
Oscar Romano
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Oscar Romano
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Oscar Romano
 
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Oscar Romano
 
20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco globalOscar Romano
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
 
Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014
Oscar Romano
 
Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Oscar Romano
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Oscar Romano
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziOscar Romano
 

More from Oscar Romano (15)

Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDCEstudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
 
VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016
 
Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016
 
Conectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXIConectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXI
 
Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)
 
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 "Transformación digital. Redes listas para la Era de la Internet de las Cosas" "Transformación digital. Redes listas para la Era de la Internet de las Cosas"
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
 
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
 
20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014
 
Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Reporte de Seguridad de Cisco 2016

  • 1. January 2016 Cisco 2016 Annual Security Report Rafael Chavez Cisco Mexico Security Sales Manager
  • 2. The Rise of Digitization is Upon Us 2015 2014 2013
  • 3. 16 billion web requests a day 500 billion emails a day In aggregate, block almost 20 billion threats per day • More than 1.1 million unique malware samples daily 18.5 billion AMP queries A View Across Cisco’s Global Telemetry
  • 4. Over 2400 Respondents • CSOs 45% SecOps 55% • Large Enterprise 13% Enterprise 38% Midmarket 49% Cisco’s 2015 Security Capabilities Benchmark Study Conducted over the Summer of 2015 Study Included 12 Countries US Mexico Brazil UK France Germany Italy Russia India Australia China Japan
  • 5. Security Concerns Weigh on the Minds of Executives Of Executives Very Concerned About Security Agreed More Information Will Be Expected 48% 92% Much More Concerned Than 3 Years Ago 41%
  • 6. Direct Attacks Generate Big Profits More efficient and more lucrative
  • 7. DNS: Auld Acquaintance Be Forgot 91.3%of malware uses DNS 68%of organizations don’t monitor it A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic
  • 8. Constraints: Budget, Compatibility, and Certification Security teams may be limited in their ability to carry out their plans
  • 9. Maturity Levels – Cisco Security Report 2015
  • 10. Current Threat Landscape • Attackers and attacks continue to be effective • Defender concern spurring action • Regions respond to uncertain Internet governance • Fragmented response inhibits an effective defense.
  • 12. Professional Attack Infrastructure Designed to evade and reconstitute
  • 13. Browser Infections Persist More than 85%of the companies studied were affected each month
  • 14. Confidence is declining, but awareness is driving action Inside the Defenses
  • 15. Mixed Confidence in Defense Capabilities 59%confident in having the latest technology 51%have strong confidence in ability to detect a security weakness in advance 54%have strong confidence in ability to defend against attacks 45%have strong confidence in ability to scope and contain an attack 54%have strong confidence in ability to verify an attack 56%review security policies on a regular basis -5% +0% -4% -1% +0% +0%
  • 16. Inherent Risk in the Infrastructure of devices surveyed across the Internet were running known vulnerabilities with an average of 26 each of devices surveyed across the Internet were End of Service of devices surveyed across the Internet were End of Life 92% 31% 5%
  • 17. Security Awareness and Training Formal Written Policies Outsource Audit and Consulting Outsource Incident Response Outsource Threat Intelligence Defenders are Responding More organizations are taking actions to become more prepared for what’s going to happen. 90% 66% 52% 42% 39% +1% +7% +1% +7% N/A
  • 18. Encrypted Traffic: A Sign of the Times Individual Privacy Government Compliance Organization Security Encrypted Traffic is Increasing It represents over 50% of bytes transferred https:// The growing trend of web encryption creates false sense of security and blind spots for defenders
  • 19. Collaboration is Critical Actionable collaboration is needed between people, processes, and technology, and on the back-end infrastructure that attackers are using. Processes People Technology
  • 20. Trust, But Verify Technology vendors need to demonstrate trustworthiness by: Creating a Security-Aware Culture Providing Rapid Remediation Responding to Breaches Quickly Following Policies and Processes Building Security Into Their Solutions
  • 21. 1. Richer network and security architecture needed 2. Best-in-class technology alone cannot deal with threat landscape 3. Integrated threat defense can converge on encrypted malicious activities 4. Open APIs are crucial 5. Requires less gear and software to install and manage 6. Automation and coordination aspects help to reduce TTD, containment, and remediation Six Tenets of an Integrated Threat Defense
  • 22. 2016 Annual Security Report Attackers are tapping into legitimate resources, becoming adept at deploying hard-to-detect and highly profitable campaigns Defenders confidence is declining, but awareness is driving action to deploy new strategies Collaboration is needed to combat today’s innovative and persistent attacks and develop architecture for tomorrow