reporte de seguridad de cisco 2016

Post on 18-Feb-2017

494 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

January 2016

Cisco 2016

Annual Security Report

Rafael ChavezCisco MexicoSecurity Sales Manager

The Rise of Digitization is Upon Us

2015 2014 2013

16 billion web requests a day

500 billion emails a day

In aggregate, block almost 20 billion threats per day

• More than 1.1 million unique malware samples daily

18.5 billion AMP queries

A View Across Cisco’s Global Telemetry

Over 2400

Respondents

• CSOs 45%

SecOps 55%

• Large Enterprise 13%

Enterprise 38%

Midmarket 49%

Cisco’s 2015 Security Capabilities Benchmark Study

Conducted

over the

Summer of 2015

Study Included

12 Countries

US

Mexico

Brazil

UK

France

Germany

Italy

Russia

India

Australia

China

Japan

Security Concerns Weigh on the Minds of Executives

Of Executives Very Concerned

About Security

Agreed More Information

Will Be Expected

48%

92%

Much More Concerned

Than 3 Years Ago41%

Direct Attacks Generate Big ProfitsMore efficient and more lucrative

DNS: Auld Acquaintance Be Forgot

91.3% of malware uses DNS

68% of organizations

don’t monitor it

A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic

Constraints: Budget, Compatibility, and Certification

Security teams may be limited in their ability to carry out their plans

Maturity Levels – Cisco Security Report 2015

Current Threat Landscape

• Attackers and attacks continue

to be effective

• Defender concern

spurring action

• Regions respond to uncertain

Internet governance

• Fragmented response inhibits

an effective defense.

Industrialization of Cybercrime

Inside the Attacks

Professional Attack InfrastructureDesigned to evade and reconstitute

Browser Infections Persist

More than

85% of the companies studied were affected each month

Confidence is declining, but awareness is driving action

Inside the Defenses

Mixed Confidence in Defense Capabilities

59% confident in having the latest technology

51% have strong confidence in ability to detect a security weakness in advance

54% have strong confidence in ability to defend against attacks

45% have strong confidence in ability to scope and contain an attack

54% have strong confidence in ability to verify an attack

56% review security policies on a regular basis

-5% +0% -4%

-1% +0% +0%

Inherent Risk in the Infrastructure

of devices surveyed across the

Internet were running known

vulnerabilities with an average

of 26 each

of devices surveyed across the

Internet were End of Service

of devices surveyed across the

Internet were End of Life

92%

31%

5%

Security Awareness and Training

Formal Written Policies

Outsource Audit and Consulting

Outsource Incident Response

Outsource Threat Intelligence

Defenders are RespondingMore organizations are taking actions to become more prepared for what’s going to happen.

90%

66%

52%

42%

39%

+1%

+7%

+1%

+7%

N/A

Encrypted Traffic: A Sign of the Times

Individual Privacy Government Compliance

Organization Security

Encrypted Traffic is Increasing

It represents over 50% of bytes transferred

https://

The growing trend of web encryption creates false sense of security and blind spots for defenders

Collaboration is Critical

Actionable collaboration is needed

between people, processes, and

technology, and on the back-end

infrastructure that attackers are using.

Processes

People

Technology

Trust, But VerifyTechnology vendors need to demonstrate trustworthiness by:

Creating a

Security-Aware

Culture

Providing Rapid

Remediation

Responding to

Breaches

Quickly

Following

Policies and

Processes

Building

Security Into

Their Solutions

1. Richer network and security architecture needed

2. Best-in-class technology alone cannot deal with threat landscape

3. Integrated threat defense can converge on encrypted malicious activities

4. Open APIs are crucial

5. Requires less gear and software to install and manage

6. Automation and coordination aspects help to reduce TTD, containment, and remediation

Six Tenets of an Integrated Threat Defense

2016 Annual Security Report

Attackers are tapping into

legitimate resources, becoming

adept at deploying hard-to-detect

and highly profitable campaigns

Defenders confidence is

declining, but awareness

is driving action to

deploy new strategies

Collaboration is needed to

combat today’s innovative and

persistent attacks and develop

architecture for tomorrow

Thank You

top related