reporte de seguridad de cisco 2016

23
January 2016 Cisco 2016 Annual Security Report Rafael Chavez Cisco Mexico Security Sales Manager

Upload: oscar-romano

Post on 18-Feb-2017

494 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Reporte de Seguridad de Cisco 2016

January 2016

Cisco 2016

Annual Security Report

Rafael ChavezCisco MexicoSecurity Sales Manager

Page 2: Reporte de Seguridad de Cisco 2016

The Rise of Digitization is Upon Us

2015 2014 2013

Page 3: Reporte de Seguridad de Cisco 2016

16 billion web requests a day

500 billion emails a day

In aggregate, block almost 20 billion threats per day

• More than 1.1 million unique malware samples daily

18.5 billion AMP queries

A View Across Cisco’s Global Telemetry

Page 4: Reporte de Seguridad de Cisco 2016

Over 2400

Respondents

• CSOs 45%

SecOps 55%

• Large Enterprise 13%

Enterprise 38%

Midmarket 49%

Cisco’s 2015 Security Capabilities Benchmark Study

Conducted

over the

Summer of 2015

Study Included

12 Countries

US

Mexico

Brazil

UK

France

Germany

Italy

Russia

India

Australia

China

Japan

Page 5: Reporte de Seguridad de Cisco 2016

Security Concerns Weigh on the Minds of Executives

Of Executives Very Concerned

About Security

Agreed More Information

Will Be Expected

48%

92%

Much More Concerned

Than 3 Years Ago41%

Page 6: Reporte de Seguridad de Cisco 2016

Direct Attacks Generate Big ProfitsMore efficient and more lucrative

Page 7: Reporte de Seguridad de Cisco 2016

DNS: Auld Acquaintance Be Forgot

91.3% of malware uses DNS

68% of organizations

don’t monitor it

A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic

Page 8: Reporte de Seguridad de Cisco 2016

Constraints: Budget, Compatibility, and Certification

Security teams may be limited in their ability to carry out their plans

Page 9: Reporte de Seguridad de Cisco 2016

Maturity Levels – Cisco Security Report 2015

Page 10: Reporte de Seguridad de Cisco 2016

Current Threat Landscape

• Attackers and attacks continue

to be effective

• Defender concern

spurring action

• Regions respond to uncertain

Internet governance

• Fragmented response inhibits

an effective defense.

Page 11: Reporte de Seguridad de Cisco 2016

Industrialization of Cybercrime

Inside the Attacks

Page 12: Reporte de Seguridad de Cisco 2016

Professional Attack InfrastructureDesigned to evade and reconstitute

Page 13: Reporte de Seguridad de Cisco 2016

Browser Infections Persist

More than

85% of the companies studied were affected each month

Page 14: Reporte de Seguridad de Cisco 2016

Confidence is declining, but awareness is driving action

Inside the Defenses

Page 15: Reporte de Seguridad de Cisco 2016

Mixed Confidence in Defense Capabilities

59% confident in having the latest technology

51% have strong confidence in ability to detect a security weakness in advance

54% have strong confidence in ability to defend against attacks

45% have strong confidence in ability to scope and contain an attack

54% have strong confidence in ability to verify an attack

56% review security policies on a regular basis

-5% +0% -4%

-1% +0% +0%

Page 16: Reporte de Seguridad de Cisco 2016

Inherent Risk in the Infrastructure

of devices surveyed across the

Internet were running known

vulnerabilities with an average

of 26 each

of devices surveyed across the

Internet were End of Service

of devices surveyed across the

Internet were End of Life

92%

31%

5%

Page 17: Reporte de Seguridad de Cisco 2016

Security Awareness and Training

Formal Written Policies

Outsource Audit and Consulting

Outsource Incident Response

Outsource Threat Intelligence

Defenders are RespondingMore organizations are taking actions to become more prepared for what’s going to happen.

90%

66%

52%

42%

39%

+1%

+7%

+1%

+7%

N/A

Page 18: Reporte de Seguridad de Cisco 2016

Encrypted Traffic: A Sign of the Times

Individual Privacy Government Compliance

Organization Security

Encrypted Traffic is Increasing

It represents over 50% of bytes transferred

https://

The growing trend of web encryption creates false sense of security and blind spots for defenders

Page 19: Reporte de Seguridad de Cisco 2016

Collaboration is Critical

Actionable collaboration is needed

between people, processes, and

technology, and on the back-end

infrastructure that attackers are using.

Processes

People

Technology

Page 20: Reporte de Seguridad de Cisco 2016

Trust, But VerifyTechnology vendors need to demonstrate trustworthiness by:

Creating a

Security-Aware

Culture

Providing Rapid

Remediation

Responding to

Breaches

Quickly

Following

Policies and

Processes

Building

Security Into

Their Solutions

Page 21: Reporte de Seguridad de Cisco 2016

1. Richer network and security architecture needed

2. Best-in-class technology alone cannot deal with threat landscape

3. Integrated threat defense can converge on encrypted malicious activities

4. Open APIs are crucial

5. Requires less gear and software to install and manage

6. Automation and coordination aspects help to reduce TTD, containment, and remediation

Six Tenets of an Integrated Threat Defense

Page 22: Reporte de Seguridad de Cisco 2016

2016 Annual Security Report

Attackers are tapping into

legitimate resources, becoming

adept at deploying hard-to-detect

and highly profitable campaigns

Defenders confidence is

declining, but awareness

is driving action to

deploy new strategies

Collaboration is needed to

combat today’s innovative and

persistent attacks and develop

architecture for tomorrow

Page 23: Reporte de Seguridad de Cisco 2016

Thank You