digital - logicom · digital disruption drives the hacker economy there is a multi-billion dollar...

Post on 13-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

•DIGITAL

#1 Enabler

of Digitization

#1 in Executive

Education Globally*

+

*Financial Times Business School Rankings, 2008-2015

Real-world Research Digital Transformation Roadmaps Executive Events and Workshops

© 2018 Global Center for Digital Business Transformation. All rights reserved. 3

Quantitative survey of

globally

In-depth discussions with

and senior executives

Analysis of to understand

mechanics of how and why disruption occurs

Workshops and events with

on their challenges and approaches

© 2018 Global Center for Digital Business Transformation. All rights reserved. 4

DIGITAL

Converging Unbundling Exponential Chaotic

© 2018 Global Center for Digital Business Transformation. All rights reserved. 5

Media andEntertainment

1

Tech Productsand Services

2

Retail 3

FinancialServices

4

Telecoms5

ConsumerPackaged Goods

6

Education7

ProfessionalServices

8

Hospitalityand Tourism

9

Manufacturing10Transportation

and Logistics11

Real Estate 12

Healthcare andPharmaceuticals

13

Energy andUtilities

14

The Security Problem

Changing

Business Models

Dynamic

Threat Landscape

Complexity

and Fragmentation

Dynamic Threat Landscape

1990 202020152010200520001995

Phishing, Low

Sophistication

Hacking Becomes

an Industry

Sophisticated

Attacks, Complex

Landscape

Viruses1990–2000

Worms2000–2005

Spyware and Rootkits2005–Today

Advanced Persistent Threats, CyberwareToday +

Criminals Know More About Your Network Than You DoCustom malware remains dormant for months to learn vulnerabilities in the network and then attack those vulnerabilities

Digital Disruption Drives the Hacker EconomyThere is a multi-billion dollar global industry targeting your prized assets

Social Security

$1

MobileMalware

$150

$Bank

Account Info>$1000 depending

on account type and balance

FacebookAccounts$1 for an

account with 15 friends

Credit CardData

$0.25-$60

MalwareDevelopment

$2500(commercial

malware)

DDoS

DDoS asA Service~$7/hour

Spam$50/500K

emails MedicalRecords

>$50

Exploits$1000-$300K

$450 Billion

World’s biggest data breaches

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Cisco 2018

Annual Cybersecurity Report

2018 Annual Cybersecurity Report

• Unprecedented levels of sophistication and impact

• Becoming more adept at evasion

• Exploiting new technology security gaps

Why are Companies & Investors Concerned

• Direct financial loss from breach

• Steal Money

• Steal Data (Loss of intellectual property or trade

secrets to competitors)

• Loss of customers

• Business Disruption

• Indirect costs from a breach

• Forensics

• Lawyers/Public Relations

HBO breach accomplished

with hard work by hacker,

poor security practices by

victim

HBO offered hackers a $250,000 'bug bounty' to stall them

1.5 million

Daily Malware

Samples

600 BILLION

Daily Email Messages

16 BILLION

Daily Web

Requests

Honeypots

Open Source

Communities

Vulnerability Discovery

(Internal)

Product

Telemetry

Internet-Wide

Scanning19.7 BILLION

Threats

Blocked

Customer Data

Sharing

Programs

Service Provider

Coordination

Program

Open

Source

Intel

Sharing

3rd Party Programs (MAPP)

Industry

Sharing

Partnerships

(ISACs)

500+

Participants

Threat Research

MILLIONSOf Telemetry

Agents

100+Threat Intelligence

Partners

Intelligence team

1100+Threat Traps

600Software

Engineers

250+Full Time Threat Intel

Researchers

Talos is the industry-leading threat intelligence

16© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

TirelessRelentlessvs

17© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Unlimited Time

Unlimited Resources

They need One Successful Attack to Succeed

Limited Time

Limited Resources

One Successful Attack to Fail

18© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Tirelessvs

Relentless Change

19© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Find and contain problems

fast

Simplifynetwork

segmentation

Control who gets onto your network

Protect users wherever they work

Stop threats at the edge

Security Enables DigitizationProtect your Business During Digital Transformation

top related