Security Everywhere: A Growth Engine for the
Digital Economy
Caspar Herzberg
VP, Cisco Consulting Services, APJ+GC
September, 2015
06.10.2015 © 2015 Cisco and/or its affiliates. All rights reserved.
Technology has become Embedded in Modern Existence
We live in a digital world enabled
by complex technologies; but what
if technology “stopped working”?
A Hyper-
Connected
Digital World
© 2015 Cisco and/or its affiliates. All rights reserved.2
Present: Internet of Things
50
2010 2015 2020
0
40
30
20
10
BillionofDevices
Inflection
Point
Timeline
World
Population
50 Billion Connected
Devices by 2020
12.5
25
6.8 7.2 7.6
Adoption rate of Digital
infrastructure: 5x faster
than electricity and
Telephony
Source: Cisco Internet of Things Report; Cisco Consulting Analysis © 2015 Cisco and/or its affiliates. All rights reserved.3
Future: From Internet of Things to Internet of Everything
© 2015 Cisco and/or its affiliates. All rights reserved.4
…combined with latest
Disruptive Technologies
Disruptive technologies that enable
new business outcomes
Physical devices and objects
connected to the internet
People, Process, Data and
Technology gets interconnected to
deliver new business value
…make ‘Internet of Everything’ a
new frontier of opportunities
c
Internet of Things
already here today
By 2020, Every Business, Country and City will become a
Digital Enterprise
© 2015 Cisco and/or its affiliates. All rights reserved.5
Digital
0100
1011
0100
0100
1011
0100
30%
of these digitization
efforts will be
successful if they
can reinvent
themselves
By 2020,
75%
of businesses
will become
fully digital or
preparing to be
In 2015,
99.4%of the
physical world is
unconnected
today
Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis
The “Bad Guys” are evolving – Cyberattacks are
increasingly Sophisticated and Dynamic
© 2015 Cisco and/or its affiliates. All rights reserved.6
20001990 1995 2005 2010 2015 2020
Viruses
1990–2000
Worms
2000–2005
Spyware
2005–Today
APTs Cyberware
Today +
Industrialization
of Hacking
Sophisticated
Attacks
Phishing, Low
Sophistication
75% of all attacks take
only minutes to begin
data exfiltration
>50% of attacks persist
without detection for
months or years before
discovery
100% of companies
connect to domains that
host malicious files or
services
Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis
Dramatic Increase in Number and Scope of Security
Breaches
© 2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis
43M
29M
25M
23M
9M
2010 2011 2012 2013 2014
Total Number of Security Incidents
Number of detected incidents rose to
43M in 2014, a 48% increase from 2013
Since 2009, we have seen a 66%
compounded annual growth rate of
detected incidents
2009
3M
Costs of Breaches amount to $20M+ for
large companies in 2014, almost double
that of 2013
The more valuable data becomes, the
more attractive hacking is to hackers
Achieving Cyber Resilience in Internet of Everything Era
Security is fundamental to the success of a company's digital strategy
© 2015 Cisco and/or its affiliates. All rights reserved.8
Public SectorManufacturing EnergyFinancial Services Retail
Countries, Cities, Companies
Digital
0100
1011
0100
Security
Next-Gen Network Architectures
Internet of Everything – People, Data, Processes and Things
IT
© 2015 Cisco and/or its affiliates. All rights reserved.9
Optimizing Security Readiness: How to Get There
Phase 2
Phase 3
End Vision
 Realign goals, refresh
human capital and
leadership
 Secure existing
enterprise IT network
i.e. routers, switches,
servers etc and move
towards an integrated
platform
 Pervasive, Integrated,
Continuous and Open
 Deploy solutions that
span across IT and
external networks
 Network seen as a
Sensor and Enforcer
 Global intelligence
based on advanced
algorithms
 3rd Party Ecosystem
Open Source
 Advanced Malware
Protection
Everywhere
 Predictive, agile and
dynamic
Solutions
Convergence
Security
Everywhere
Integrated Threat
Defence
Organizational
Change
Phase 1
SecurityReadiness
Phased Approach to Security Organizational Enablement
© 2015 Cisco and/or its affiliates. All rights reserved.10
Phase 1: Organizational Change
Cultural Change Talent Pool
 Security to be
engaged at
boardroom
level
 Personnel to be
embedded into
business units
+ =+
 Increase
collaboration
between work
teams
 Direct or
indirect revenue
impact
 Invest in human
capital
 Training and
Up-skilling
Enablement
Renew
corporate focus
on Security
New Metrics
© 2015 Cisco and/or its affiliates. All rights reserved.11
ENTERPRISE IT
Email
Security
Web
Security
Advanced
Mature
Protection
Secure
Routing
Firewall
NGIPS
Secure
Access
Businesses of all sizes must
embed security into heart of
network to achieve defense in
depth.
Ideally, solutions should move
towards a converged model
which minimize disparate
point-product deployment
A converged model will capture
real time information on
network across all critical
assets, providing holistic view
of internal and external
threats
Phase 2: Solutions Convergence
© 2015 Cisco and/or its affiliates. All rights reserved.12
Phase 3: Security Everywhere across End Points and
Extended Network
Security Everywhere
Extended
Network
End Points
& Devices
Core IT
Network
Mobile TelepresenceLaptops
CloudData CenterBranch CampusEdge
Operational
Technology
Switches Routers Server DC Switch Wireless
Controller
Security Everywhere
PERVASIVE – to persist
across all attack vectors
INTEGRATED – To share
information, intelligence, and
capabilities
CONTINOUS – Allow for
ongoing protection across full
attack continuum
1
2
3
OPEN – Option to integrate
with third parties
4
© 2015 Cisco and/or its affiliates. All rights reserved.13
End Vision: Integrated Threat Defense
GLOBAL INTELLIGENCE ADVANCED MALWARE
PROTECTION
AGILE ARCHITECTURE AND
PLATFORMS
Threat
Research
Telemetry
Data
Advanced
Algorithms
Security Ecosystem
Contextual Sharing
Accelerated Containment & Remediation
Open
Continuous
Integrated
Pervasive
© 2015 Cisco and/or its affiliates. All rights reserved.14
Cisco can Accelerate your Digital Journey with Holistic
Security Solutions
Secure
Access
Mgmt.
Advanced
Malware
Protection
Cloud / DC
Security
Network
Security
PLAN
Capabilities Assessment
Architecture and Design
Custom Threat Intelligence
BUILD
Integration and Deployment
Security Optimization and Migration
Managed Threat Defense
Remote Managed or Hosted Services
RUN
© 2015 Cisco and/or its affiliates. All rights reserved.15
Looking Ahead into the Future: Canalys Top Predictions for
2015
Cybercrime will reach new levels
Connected Things will create a major security loophole
Mobile Payment systems will mean new threats
DDoS attacks will target hosting and cloud providers
Security gets C-Levels buy-in
Increased level of regulation
Security will shift from being technology-centric to platform-centric
User will be at heart of every security strategy
© 2015 Cisco and/or its affiliates. All rights reserved.16
Embracing Change and Position for the Next Digital
Disruption
“Organizations no longer want to accept that compromise is
inevitable. They are looking to the security industry to
provide them with products that are reliable and resilient,
and capable of deflecting even the most sophisticated
threats.” John N.Stewart, Chief Security and Trust Officer Cisco
• Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of
digital disruption known as Internet of Everything (IoE)
• Security is fundamental to the success of a company’s digital strategy as all ‘things’ get
connected
• ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing
cybersecurity risks
Security Everywhere: A Growth Engine for the Digital Economy

Security Everywhere: A Growth Engine for the Digital Economy

  • 1.
    Security Everywhere: AGrowth Engine for the Digital Economy Caspar Herzberg VP, Cisco Consulting Services, APJ+GC September, 2015 06.10.2015 © 2015 Cisco and/or its affiliates. All rights reserved.
  • 2.
    Technology has becomeEmbedded in Modern Existence We live in a digital world enabled by complex technologies; but what if technology “stopped working”? A Hyper- Connected Digital World © 2015 Cisco and/or its affiliates. All rights reserved.2
  • 3.
    Present: Internet ofThings 50 2010 2015 2020 0 40 30 20 10 BillionofDevices Inflection Point Timeline World Population 50 Billion Connected Devices by 2020 12.5 25 6.8 7.2 7.6 Adoption rate of Digital infrastructure: 5x faster than electricity and Telephony Source: Cisco Internet of Things Report; Cisco Consulting Analysis © 2015 Cisco and/or its affiliates. All rights reserved.3
  • 4.
    Future: From Internetof Things to Internet of Everything © 2015 Cisco and/or its affiliates. All rights reserved.4 …combined with latest Disruptive Technologies Disruptive technologies that enable new business outcomes Physical devices and objects connected to the internet People, Process, Data and Technology gets interconnected to deliver new business value …make ‘Internet of Everything’ a new frontier of opportunities c Internet of Things already here today
  • 5.
    By 2020, EveryBusiness, Country and City will become a Digital Enterprise © 2015 Cisco and/or its affiliates. All rights reserved.5 Digital 0100 1011 0100 0100 1011 0100 30% of these digitization efforts will be successful if they can reinvent themselves By 2020, 75% of businesses will become fully digital or preparing to be In 2015, 99.4%of the physical world is unconnected today Source: Gartner Digital Business Transformation: Disrupt to Win Report; Cisco Consulting Analysis
  • 6.
    The “Bad Guys”are evolving – Cyberattacks are increasingly Sophisticated and Dynamic © 2015 Cisco and/or its affiliates. All rights reserved.6 20001990 1995 2005 2010 2015 2020 Viruses 1990–2000 Worms 2000–2005 Spyware 2005–Today APTs Cyberware Today + Industrialization of Hacking Sophisticated Attacks Phishing, Low Sophistication 75% of all attacks take only minutes to begin data exfiltration >50% of attacks persist without detection for months or years before discovery 100% of companies connect to domains that host malicious files or services Source: Cisco Industrialization of Hacking white paper; Cisco Consulting Analysis
  • 7.
    Dramatic Increase inNumber and Scope of Security Breaches © 2015 Cisco and/or its affiliates. All rights reserved.7 Source: PwC Global State of Information Security Survey 2015; Cisco Consulting Analysis 43M 29M 25M 23M 9M 2010 2011 2012 2013 2014 Total Number of Security Incidents Number of detected incidents rose to 43M in 2014, a 48% increase from 2013 Since 2009, we have seen a 66% compounded annual growth rate of detected incidents 2009 3M Costs of Breaches amount to $20M+ for large companies in 2014, almost double that of 2013 The more valuable data becomes, the more attractive hacking is to hackers
  • 8.
    Achieving Cyber Resiliencein Internet of Everything Era Security is fundamental to the success of a company's digital strategy © 2015 Cisco and/or its affiliates. All rights reserved.8 Public SectorManufacturing EnergyFinancial Services Retail Countries, Cities, Companies Digital 0100 1011 0100 Security Next-Gen Network Architectures Internet of Everything – People, Data, Processes and Things IT
  • 9.
    © 2015 Ciscoand/or its affiliates. All rights reserved.9 Optimizing Security Readiness: How to Get There Phase 2 Phase 3 End Vision  Realign goals, refresh human capital and leadership  Secure existing enterprise IT network i.e. routers, switches, servers etc and move towards an integrated platform  Pervasive, Integrated, Continuous and Open  Deploy solutions that span across IT and external networks  Network seen as a Sensor and Enforcer  Global intelligence based on advanced algorithms  3rd Party Ecosystem Open Source  Advanced Malware Protection Everywhere  Predictive, agile and dynamic Solutions Convergence Security Everywhere Integrated Threat Defence Organizational Change Phase 1 SecurityReadiness Phased Approach to Security Organizational Enablement
  • 10.
    © 2015 Ciscoand/or its affiliates. All rights reserved.10 Phase 1: Organizational Change Cultural Change Talent Pool  Security to be engaged at boardroom level  Personnel to be embedded into business units + =+  Increase collaboration between work teams  Direct or indirect revenue impact  Invest in human capital  Training and Up-skilling Enablement Renew corporate focus on Security New Metrics
  • 11.
    © 2015 Ciscoand/or its affiliates. All rights reserved.11 ENTERPRISE IT Email Security Web Security Advanced Mature Protection Secure Routing Firewall NGIPS Secure Access Businesses of all sizes must embed security into heart of network to achieve defense in depth. Ideally, solutions should move towards a converged model which minimize disparate point-product deployment A converged model will capture real time information on network across all critical assets, providing holistic view of internal and external threats Phase 2: Solutions Convergence
  • 12.
    © 2015 Ciscoand/or its affiliates. All rights reserved.12 Phase 3: Security Everywhere across End Points and Extended Network Security Everywhere Extended Network End Points & Devices Core IT Network Mobile TelepresenceLaptops CloudData CenterBranch CampusEdge Operational Technology Switches Routers Server DC Switch Wireless Controller Security Everywhere PERVASIVE – to persist across all attack vectors INTEGRATED – To share information, intelligence, and capabilities CONTINOUS – Allow for ongoing protection across full attack continuum 1 2 3 OPEN – Option to integrate with third parties 4
  • 13.
    © 2015 Ciscoand/or its affiliates. All rights reserved.13 End Vision: Integrated Threat Defense GLOBAL INTELLIGENCE ADVANCED MALWARE PROTECTION AGILE ARCHITECTURE AND PLATFORMS Threat Research Telemetry Data Advanced Algorithms Security Ecosystem Contextual Sharing Accelerated Containment & Remediation Open Continuous Integrated Pervasive
  • 14.
    © 2015 Ciscoand/or its affiliates. All rights reserved.14 Cisco can Accelerate your Digital Journey with Holistic Security Solutions Secure Access Mgmt. Advanced Malware Protection Cloud / DC Security Network Security PLAN Capabilities Assessment Architecture and Design Custom Threat Intelligence BUILD Integration and Deployment Security Optimization and Migration Managed Threat Defense Remote Managed or Hosted Services RUN
  • 15.
    © 2015 Ciscoand/or its affiliates. All rights reserved.15 Looking Ahead into the Future: Canalys Top Predictions for 2015 Cybercrime will reach new levels Connected Things will create a major security loophole Mobile Payment systems will mean new threats DDoS attacks will target hosting and cloud providers Security gets C-Levels buy-in Increased level of regulation Security will shift from being technology-centric to platform-centric User will be at heart of every security strategy
  • 16.
    © 2015 Ciscoand/or its affiliates. All rights reserved.16 Embracing Change and Position for the Next Digital Disruption “Organizations no longer want to accept that compromise is inevitable. They are looking to the security industry to provide them with products that are reliable and resilient, and capable of deflecting even the most sophisticated threats.” John N.Stewart, Chief Security and Trust Officer Cisco • Hyper-Connectivity of People, Data, Processes and Things will usher in the next wave of digital disruption known as Internet of Everything (IoE) • Security is fundamental to the success of a company’s digital strategy as all ‘things’ get connected • ‘Security Everywhere’ enables organizations to be proactive in identifying and addressing cybersecurity risks