SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Securing the Internet
of Everything
Organizations worldwide are becoming digital to capitalize on the unprecedented opportunity brought about by the next wave of the
internet – the Internet of Everything (IoE). While creating incredible opportunity this transformation also presents new challenges.
CEO’s Top Challenges
42%
Threat to data or
physical security
38%
Inability of IT to keep
pace with change
32%
Regulatory or compliance
challenges
Source: Cisco Consulting Services, 2012
IoE Creates New Security Challenges
To secure connections among people, process, data, and things, security needs to be as ubiquitous as the Internet of Everything. Physical and
cyber security solutions must work intelligently together and protect the networks, devices, applications, users, and data that make up the IoE.
37% of data will be processed
at the edge (mobile devices,
appliances, routers), by 2017.
Source: Cisco Consulting Services “Internet of Things” Global
Study, 2014
Increase in connected devices
Move to automation Processing data at the edge
Increase in amount of data
Increased connectivity creates more attack vectors for bad actors to exploit. With such a dynamic threat landscape,
security is constantly changing, increasingly complex, and critical to success.
IoE Creates More Attack Vectors
Source: 2014: Year of Mega Breaches, Ponemon, 2015
65% of companies said they
couldn’t stop the breach
because it evaded their existing
preventative measures.
55% of companies couldn’t
identify where in their network
the breach occurred.
33% of companies took more
than 2 years to discover a
breach occurred.
52% of companies said they
lost reputation, brand image,
and marketplace value due to a
breach.
Cisco’s IoE Security Services Framework
To secure the Internet of Everything it is essential to use a holistic approach, working through the entire value chain of your network. Every layer must be secure –
technology, process and people.
For more information, please visit: www.cisco.com/go/services/security
© Cisco, 2015
PeopleTechnology
Security StrategyApplication Security
Endpoint and Sensor Security
Infrastructure and Cloud Security
Operational Security
Standards and Interoperability
Security Architecture
IT Governance and Risk Management
Policy and Procedures
Secure Device Distribution
Physical Security
Vulnerability Management
Data Classification
Privacy and Data Lifecycle Management
Upgrade and Maintenance Capabilities
Compliance and Assurance
3rd Party Risk Management
Secure Interface Design
Secure Development Lifecycle
Threat Training and Awareness
Custom Code Security
Secure Communication
Device Provisioning and Management
Malicious Code Protection
Network and Device OS Segmentation
DRM
Anti-tamper
Secure Cloud Build and Virtualization
Network Design and Communication
Encryption and
Cryptography
Access Control
Process ++ +
++
+
+
+

Contenu connexe

En vedette

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 

En vedette (15)

Alexander - Education in the Internet of Everything
Alexander - Education in the Internet of EverythingAlexander - Education in the Internet of Everything
Alexander - Education in the Internet of Everything
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
 
The impact of the Internet of Things (IoT) on telcos, datacenter, and utilities
The impact of the Internet of Things (IoT) on telcos, datacenter, and utilitiesThe impact of the Internet of Things (IoT) on telcos, datacenter, and utilities
The impact of the Internet of Things (IoT) on telcos, datacenter, and utilities
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16
 
Internet of things (IOT)
Internet of things (IOT)Internet of things (IOT)
Internet of things (IOT)
 
The internet of things is for people
The internet of things is for peopleThe internet of things is for people
The internet of things is for people
 
Internet of Things : Trends to Watch in 2016
Internet of Things:  Trends to Watch in 2016Internet of Things:  Trends to Watch in 2016
Internet of Things : Trends to Watch in 2016
 
An Introduction to the Internet of Things
An Introduction to the Internet of ThingsAn Introduction to the Internet of Things
An Introduction to the Internet of Things
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
7 ways companies are using the Internet of Things technology
7 ways companies are using the Internet of Things technology7 ways companies are using the Internet of Things technology
7 ways companies are using the Internet of Things technology
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
When Your Internet Things Know How You Feel
When Your Internet Things Know How You FeelWhen Your Internet Things Know How You Feel
When Your Internet Things Know How You Feel
 
Internet of Things presentation
Internet of Things presentationInternet of Things presentation
Internet of Things presentation
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Plus de xband

Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limits
xband
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administration
xband
 

Plus de xband (20)

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentation
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Report
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResource
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualization
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Between
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limits
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administration
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Securing the Internet of Everything - Holistic approach

  • 1. Securing the Internet of Everything Organizations worldwide are becoming digital to capitalize on the unprecedented opportunity brought about by the next wave of the internet – the Internet of Everything (IoE). While creating incredible opportunity this transformation also presents new challenges. CEO’s Top Challenges 42% Threat to data or physical security 38% Inability of IT to keep pace with change 32% Regulatory or compliance challenges Source: Cisco Consulting Services, 2012
  • 2. IoE Creates New Security Challenges To secure connections among people, process, data, and things, security needs to be as ubiquitous as the Internet of Everything. Physical and cyber security solutions must work intelligently together and protect the networks, devices, applications, users, and data that make up the IoE. 37% of data will be processed at the edge (mobile devices, appliances, routers), by 2017. Source: Cisco Consulting Services “Internet of Things” Global Study, 2014 Increase in connected devices Move to automation Processing data at the edge Increase in amount of data
  • 3. Increased connectivity creates more attack vectors for bad actors to exploit. With such a dynamic threat landscape, security is constantly changing, increasingly complex, and critical to success. IoE Creates More Attack Vectors Source: 2014: Year of Mega Breaches, Ponemon, 2015 65% of companies said they couldn’t stop the breach because it evaded their existing preventative measures. 55% of companies couldn’t identify where in their network the breach occurred. 33% of companies took more than 2 years to discover a breach occurred. 52% of companies said they lost reputation, brand image, and marketplace value due to a breach.
  • 4. Cisco’s IoE Security Services Framework To secure the Internet of Everything it is essential to use a holistic approach, working through the entire value chain of your network. Every layer must be secure – technology, process and people. For more information, please visit: www.cisco.com/go/services/security © Cisco, 2015 PeopleTechnology Security StrategyApplication Security Endpoint and Sensor Security Infrastructure and Cloud Security Operational Security Standards and Interoperability Security Architecture IT Governance and Risk Management Policy and Procedures Secure Device Distribution Physical Security Vulnerability Management Data Classification Privacy and Data Lifecycle Management Upgrade and Maintenance Capabilities Compliance and Assurance 3rd Party Risk Management Secure Interface Design Secure Development Lifecycle Threat Training and Awareness Custom Code Security Secure Communication Device Provisioning and Management Malicious Code Protection Network and Device OS Segmentation DRM Anti-tamper Secure Cloud Build and Virtualization Network Design and Communication Encryption and Cryptography Access Control Process ++ + ++ + + +