the 4th industrial revolution and cyber security - evry · the 4th industrial revolution and cyber...

Post on 01-May-2018

223 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Updated May 2017

Sven Størmer Thaulow – Adm dir Cisco Norway

The 4th industrial revolution and cyber security

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

20-50 bill.Connected

devices

2020

1000Connected

devices

1984

2020 – 40% of all data from

sensors

More data created in 2017

than the last 5000 years..

1992100

GB/day

1997100 GB/t

2002100 GB/s

20072000 GB/s

201626600GB/s

2021105800

GB/s

Global Internet Traffic(Kilde: Cisco VNI Index 2017)

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential #CiscoConnect

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco Norway

• 600 world class people

• Ciscos largest R&D facility in Europe

• Amongst the largest R&D centers in high tech in Norway

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco Norway is the leading force in the world within collaboration – latest outis the Cisco Sparkboard

Hu

man

Pro

gres

s

Time

We are living in exponential times – the ”Die Progress Unit”

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

We are in the beginning of the 4th industrial revolution

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

The 4th industrial revolution = digitizing all working processes – fueling disruption and higher efficiency

Big data

Cloud

IoTArtificial

Intelligence

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Internet to the people!

Global Internet Users (MM), 2009 - 2016

Y/Y

% G

row

th

Glo

bal

Inte

rnet

Use

rs (

MM

)

Global Internet Users (MM) Y/Y % Growth

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

TIMELINE

2010 2015 2020

BIL

LIO

NS

OF

DEV

ICES

0

10

20

30

50

Adoption rate of digital infrastructure:

5X faster than electricity and telephony

25

12.5

7.26.8 7.6

World Population

50 Billion Smart Objects

Inflectionpoint

Internet to the Things!IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Internet of people – IP4

=

4,3BN connections onlineGolfball

IoT

Internet of Things – IP6

=

3.4×1038

connections online

3ffe:1900:4545:3:200:f8ff:fe21:67cfIoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Top 10 use cases1. Smart Home

2. Wearables

3. Connected Cars

4. Industrial Internet

5. Smart Cities

6. IoT in Agriculture

7. Smart Retail

8. Energy Engagment

9. IoT in Healthcare

10. IoT in Poultry and Farming

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

We are connecting the industry

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Single Converged IP NetworkSeparate Building System Networks

We are connecting the buildings

Light Fixture Becomes a Data Source; Broken Silos Enables Analytics

Single Converged IP Network for Building and IT Systems

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

We are connecting the cities

▪ Greater Copenhagen Strives for CO2 Neutrality

Smart Parking Smart Light Mobility Monitoring Waste Air Pollution Analytics Soil Sensing

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

We are connecting the electricity grids

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Power stations, Oil rigs…..

All critical infrastructure

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

IoT will generate $19 trillion in value acrossall industries in the next decade

IoT

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

BUT what if the infrastructure is not SECURE?

Big data

Cloud

ArtificialIntelligence IoTSecurity

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Dangerous Times: World’s biggest data breachesSecurity

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Security

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Global INsecurity

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

There is a multi-billion dollar global industry targeting your prized assets

Social Security

$1

MobileMalware

$150

$Bank

Account Info>$1000 depending

on account type and balance

FacebookAccounts$1 for an

account with 15 friends

Credit CardData

$0.25-$60

MalwareDevelopment

$2500(commercial

malware)

DDoS

DDoS asA Service~$7/hour

Spam$50/500K

emails MedicalRecords

>$50

Exploits$1000-$300K

$450 Billionto

$1 Trillion

Digital Disruption Drives the Hacker EconomySecurity

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Security Challenges in the 4th Digital Revolution

Maintaining security, risk and compliance –

increased attack surface

Staying ahead in a very dynamic threat

landscape

Reducing complexity and fragmentation

in security architecure

Last 20 years of security:

Got a problem?

Buy a Box

Security

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

DataNGIPS

MalwareSandbox

IAM

Antivirus

IDSFirewall

VPN

Email

NGFW

Time to detection:

100 Days

Attackers Are Exploiting Point Solutions with Increasing Speed Security

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

58% 57% 57% 57%

The Top 4 Sources of Concern Which Security Professionals Found in Defending Against a Cyberattack

Mobile Devices Data in Public Cloud Cloud Infrastructure

Percentage of respondents who find the category very and extremely challenging to defend

User Behavior

Security

Time

Do you have an effective security posture?

ResponseDetectionThreat

Human behaviour

Holistic securityarchitecture

Consolidation ofsec systems

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

UTM

NetworkAnalytics

Advanced MalwareProtection

Secure Internet Gateway

WebW W W

Network Policies and Access

Email

Firewalls

Cloud Access Security Broker

Cisco utilize artificial intelligence and integrated security architecture to detect threats - TALOS

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Digitization is really about digitizing all working processes in all businesses – fueling disruption

Big data

Cloud

ArtificialIntelligence IoT

YOU ARE HERE

Hu

man

Pro

gres

s

Time

x

top related