New Opportunities, New Risks:
The Internet of Things and
Business Innovation
The Internet of Things is expected to
grow to approximately 50 billion things
by 2020.
Source: 2014 Mid-Year Security Report, Cisco
Click this button to tweet the
information on each slide.
The Internet of Things is creating
unprecedented opportunities for both
individuals and organizations to gain
greater value from networked
connections among people, processes,
data and things. Source: Blog, Cisco
There is greater potential that more
personal information and business data
will exist in the cloud.
With that comes significant implications for
applying proper security to protect the data
and establishing privacy policies.
Source: Blog, Cisco
According to the Ponemon Institute, the
average cost of an organizational data
breach was US$5.4 million in 2014, up
from US$4.5 million in 2013.
Source: 2014 Mid-Year Security Report, Cisco
The Center for Strategic and International
Studies’ Estimating the Cost of Cyber
Crime and Cyber Espionage report
estimates that US$100 billion is lost
annually to the US economy, and as
many as 508,000 US jobs are lost,
because of malicious online activity.
Source: 2014 Mid-Year Security Report, Cisco
New Risks
• IoT devices spreading malware26% voiced a concern that these devices could spread malware
to companies, or be the subject to denial-of-service attacks
• PrivacyWhen adversaries reach a point where they begin correlating
information from different sources, they will be able to gain a
much bigger picture about users
• Forgotten assetsThe pressing concern of the growing population of abandoned
and unmanaged Internet-connected devices
Cisco security researchers found that
malicious traffic was visible on 100
percent of the networks sampled.Source: 2014 Mid-Year Security Report, Cisco
To combat these threats across the entire
attack continuum — before, during, and
after an attack, organizations need
pervasive protection across a broad range
of attack vectors. Source: Blog, Cisco
New Opportunities
• Visibility-drivenThe more we see, the more we can correlate information and apply
intelligence to make better decisions and take action
• Threat-centricReal-time security intelligence can be delivered from the cloud and
shared across all security solutions to detect and remediate threats
• Platform-basedSecurity requires an integrated system of agile and open platforms that
cover network devices and the cloud
More about opportunities and risks
in this new era:
Download the Cisco Annual Security Report 2015