jiří devát, generální ředitel cisco systems...2014/02/04  · cisco annual security report:...

Post on 14-Jul-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.

Jiří Devát, generální ředitel

Cisco Systems

Praha, 4. února 2014

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

• Bezpečnostní hrozby a zranitelnost nejvyšší od roku 2000

• 95% velkých společností se stalo cílem zákeřných útoků

• 100% podnikových sítí zaznamenalo interakci s malware

• DDoS útoky narostly v objemu i závažnosti

• Celosvětově nedostatek více než 1 000 000 bezpečnostních profesionálů

• 95% veškerého mobilního malware míří na zařízení se systémem Android

Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved.

Riziko

malware

záznamů

podle odvětví,

2013

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved.

Stolní počítače

Mobilita BYOD

Internet věcí

Internet of Everything

200 mil

10 mld

50 mld

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved.

Indicators of

Compromise

By Type

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

• Organizations need to come to an agreement as to what is most important from a cybersecurity perspective

• Organizations need to examine their security model holistically and gain visibility across the entire attack continuum

• Technology vendors must help assure customers that security is a priority in their manufacturing processes—and be prepared to back up those assurances

• NEED BULLET ON TALENT SHORTAGE

Thank you.

Cisco Confidential 21 © 2010 Cisco and/or its affiliates. All rights reserved.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Cisco Confidential 25 © 2010 Cisco and/or its affiliates. All rights reserved.

Top Android

Malware

Families

Observed,

2013

top related