Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing the Internet of Everything - Holistic approach

214 views

Published on

Organizations worldwide are becoming digital to capitalize on the unprecedented opportunity brought about by the next wave of the
internet – the Internet of Everything (IoE). While creating incredible opportunity this transformation also presents new challenges.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Securing the Internet of Everything - Holistic approach

  1. 1. Securing the Internet of Everything Organizations worldwide are becoming digital to capitalize on the unprecedented opportunity brought about by the next wave of the internet – the Internet of Everything (IoE). While creating incredible opportunity this transformation also presents new challenges. CEO’s Top Challenges 42% Threat to data or physical security 38% Inability of IT to keep pace with change 32% Regulatory or compliance challenges Source: Cisco Consulting Services, 2012
  2. 2. IoE Creates New Security Challenges To secure connections among people, process, data, and things, security needs to be as ubiquitous as the Internet of Everything. Physical and cyber security solutions must work intelligently together and protect the networks, devices, applications, users, and data that make up the IoE. 37% of data will be processed at the edge (mobile devices, appliances, routers), by 2017. Source: Cisco Consulting Services “Internet of Things” Global Study, 2014 Increase in connected devices Move to automation Processing data at the edge Increase in amount of data
  3. 3. Increased connectivity creates more attack vectors for bad actors to exploit. With such a dynamic threat landscape, security is constantly changing, increasingly complex, and critical to success. IoE Creates More Attack Vectors Source: 2014: Year of Mega Breaches, Ponemon, 2015 65% of companies said they couldn’t stop the breach because it evaded their existing preventative measures. 55% of companies couldn’t identify where in their network the breach occurred. 33% of companies took more than 2 years to discover a breach occurred. 52% of companies said they lost reputation, brand image, and marketplace value due to a breach.
  4. 4. Cisco’s IoE Security Services Framework To secure the Internet of Everything it is essential to use a holistic approach, working through the entire value chain of your network. Every layer must be secure – technology, process and people. For more information, please visit: www.cisco.com/go/services/security © Cisco, 2015 PeopleTechnology Security StrategyApplication Security Endpoint and Sensor Security Infrastructure and Cloud Security Operational Security Standards and Interoperability Security Architecture IT Governance and Risk Management Policy and Procedures Secure Device Distribution Physical Security Vulnerability Management Data Classification Privacy and Data Lifecycle Management Upgrade and Maintenance Capabilities Compliance and Assurance 3rd Party Risk Management Secure Interface Design Secure Development Lifecycle Threat Training and Awareness Custom Code Security Secure Communication Device Provisioning and Management Malicious Code Protection Network and Device OS Segmentation DRM Anti-tamper Secure Cloud Build and Virtualization Network Design and Communication Encryption and Cryptography Access Control Process ++ + ++ + + +

×