Information Systems Security Association Innovative Security for an Accelerating World New Approaches for Chief Security Officers John N. Stewart Senior Vice President Chief Security and Trust Officer Cisco April 19, 2015
Cyber is Crime Corporate espionage National espionage Disruption Destruction Terrorism Protest
Gaps Between Perception & Reality of Threats Attackers Are Expanding Tactics Snowshoe spam, Web Exploit kits & combinations of JavaScript and Flash malware Users Unknowingly Aid Attacks 280% spike in Silverlight Attacks; 250% spike in spam & malvertising exploits Infections Are the New Normal 100% of networks analyzed have traffic going to sites hosting malware Source: 2015 Cisco Annual Security Report
Internet of Everything 39 % of the world s population is connected 13B connected things Technology powers 80 % of business processes More data in one year than in previous 5000
CONNECTED THINGS
Exponential Connections = Exponential Security Challenges Traditional Security Challenges Smart Objects Increased attack surface Talent shortage Many IT Security vendors per company (average = 65) IT teams don t understand how it all fits together 6 130 Devices per Person Sensors per Person
You Need Platform-Based Security
Platform-Based Security Solutions Start with Visibility and Control Superior Visibility Granular Control Advanced Threat Protection Actionable Intelligence Automated Decisions Advanced video analytics, remote management, and multisite event correlation Differentiated policy enforcement across the extended network Comprehensive cyber security threat detection and mitigation Internetworked security solutions for superior intelligence and rapid response Machine-to-machine enabled security control with no human intervention required
Platform-Based Security Solutions to Reduce Complexity and Increase Capability Collective Security Intelligence Centralized Management Appliances, Virtual Network/DC Control Platform Device Control Platform Cloud Services Control Platform Appliances, Virtual Host, Mobile, Virtual Hosted
Strong Analytics Drive Actionable Security Decision Making
IoT Creates Data at Scale Never Seen Before A large refinery generates 1TB of raw data per day Analytics are vital to securing everything in the IoT
Threat Intelligence: Unprecedented Breadth & Depth 100TB Security Intelligence 150,000 Microapplications 5,500 IPS Signatures 5B Daily Email Connections Innovation Platform Products Services Enterprise Security Threat Intelligence Platform Core Data Processing Statistical Computing Load-Balanced, Highly Available APIs Direct Access to Raw and Refined Data 1.6M Deployed Devices 93B Daily Email Messages 150M Deployed Endpoints 1,000 Applications Visualization Incubation Hosting Data Cleansing Data Scientists Column Family Story Security Engineers R&D/Data Analysis/Refinement Document Database Software Engineers Graph Database Security Scientists IT Services Streaming Processes Map/Reduce Processes 13B Web Requests 35% Enterprise Email 3-5 min Updates 4.5B Daily Email Blocks Service Monitoring Security Monitoring Identity Access & Management Relational Databases Hadoop HDFS Data Integration Cluster Consumer Clients for Messages Data Integration Scripts DC & WAN Management Source Code Management Message System Broker Proxy and Services 120K Sandbox Reports 75,000 FireAMP Updates 6,000 New Clam AV Sigs 14M Deployed Access Gateway Internal and External Datasets for Telemetry, Network Posture, Enrichment,and Reputation
Emerging Security Technology: We All Need Innovators and Partners
Give and Take Integration Ecosystem
Security Companies to Watch
The Bottom Line: In the Internet of Everything Era Every company must be a technology company And every company must be a SECURITY company
IPv4 = 3B Addresses, One for Every Two People on Earth You are here IPv6 = 252 Addresses for Every Star in the Known Universe
Thank You.