digital - logicom · digital disruption drives the hacker economy there is a multi-billion dollar...
TRANSCRIPT
•DIGITAL
#1 Enabler
of Digitization
#1 in Executive
Education Globally*
+
*Financial Times Business School Rankings, 2008-2015
Real-world Research Digital Transformation Roadmaps Executive Events and Workshops
© 2018 Global Center for Digital Business Transformation. All rights reserved. 3
Quantitative survey of
globally
In-depth discussions with
and senior executives
Analysis of to understand
mechanics of how and why disruption occurs
Workshops and events with
on their challenges and approaches
© 2018 Global Center for Digital Business Transformation. All rights reserved. 4
DIGITAL
Converging Unbundling Exponential Chaotic
© 2018 Global Center for Digital Business Transformation. All rights reserved. 5
Media andEntertainment
1
Tech Productsand Services
2
Retail 3
FinancialServices
4
Telecoms5
ConsumerPackaged Goods
6
Education7
ProfessionalServices
8
Hospitalityand Tourism
9
Manufacturing10Transportation
and Logistics11
Real Estate 12
Healthcare andPharmaceuticals
13
Energy andUtilities
14
The Security Problem
Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
Dynamic Threat Landscape
1990 202020152010200520001995
Phishing, Low
Sophistication
Hacking Becomes
an Industry
Sophisticated
Attacks, Complex
Landscape
Viruses1990–2000
Worms2000–2005
Spyware and Rootkits2005–Today
Advanced Persistent Threats, CyberwareToday +
Criminals Know More About Your Network Than You DoCustom malware remains dormant for months to learn vulnerabilities in the network and then attack those vulnerabilities
Digital Disruption Drives the Hacker EconomyThere is a multi-billion dollar global industry targeting your prized assets
Social Security
$1
MobileMalware
$150
$Bank
Account Info>$1000 depending
on account type and balance
FacebookAccounts$1 for an
account with 15 friends
Credit CardData
$0.25-$60
MalwareDevelopment
$2500(commercial
malware)
DDoS
DDoS asA Service~$7/hour
Spam$50/500K
emails MedicalRecords
>$50
Exploits$1000-$300K
$450 Billion
World’s biggest data breaches
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Cisco 2018
Annual Cybersecurity Report
2018 Annual Cybersecurity Report
• Unprecedented levels of sophistication and impact
• Becoming more adept at evasion
• Exploiting new technology security gaps
Why are Companies & Investors Concerned
• Direct financial loss from breach
• Steal Money
• Steal Data (Loss of intellectual property or trade
secrets to competitors)
• Loss of customers
• Business Disruption
• Indirect costs from a breach
• Forensics
• Lawyers/Public Relations
HBO breach accomplished
with hard work by hacker,
poor security practices by
victim
HBO offered hackers a $250,000 'bug bounty' to stall them
1.5 million
Daily Malware
Samples
600 BILLION
Daily Email Messages
16 BILLION
Daily Web
Requests
Honeypots
Open Source
Communities
Vulnerability Discovery
(Internal)
Product
Telemetry
Internet-Wide
Scanning19.7 BILLION
Threats
Blocked
Customer Data
Sharing
Programs
Service Provider
Coordination
Program
Open
Source
Intel
Sharing
3rd Party Programs (MAPP)
Industry
Sharing
Partnerships
(ISACs)
500+
Participants
Threat Research
MILLIONSOf Telemetry
Agents
100+Threat Intelligence
Partners
Intelligence team
1100+Threat Traps
600Software
Engineers
250+Full Time Threat Intel
Researchers
Talos is the industry-leading threat intelligence
16© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TirelessRelentlessvs
17© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Unlimited Time
Unlimited Resources
They need One Successful Attack to Succeed
Limited Time
Limited Resources
One Successful Attack to Fail
18© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Tirelessvs
Relentless Change
19© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Find and contain problems
fast
Simplifynetwork
segmentation
Control who gets onto your network
Protect users wherever they work
Stop threats at the edge
Security Enables DigitizationProtect your Business During Digital Transformation