SlideShare a Scribd company logo
1 of 15
Ever-expanding connectivity
as a result of modern
networks is transforming
our world.
According to the Global Center for Digital
Business Transformation (DBT Center):
4 of today’s top 10 incumbents
(in terms of market share) in each
industry will be displaced by digital
disruption in the next 5 years.
Source: Global Center for Digital Business Transformation, IMD and Cisco
The Internet of
Everything (IoE) is
generating unprecedented
opportunities for
networked connections
among people,
processes, data, and
things.
19 trillion
value
Source: http://ioeassessment.cisco.com/learn, Cisco
We are now facing a similar evolution
with respect to security. Security
must be everywhere —
embedded into the heart of the
intelligent network infrastructure
and spanning throughout the
extended network.
In a recent IoT Survey by Cisco Consulting Services that
included 1,230 customers globally, when asked …
“What are the biggest drawbacks of
adopting IoT solutions in your organization?”
Customers answered…
“Threats to the privacy of
our workers and/or customers”
“Threats to IT or
physical security”
Source: “Attaining IoT Value: How To Move from Connecting
Things to Capturing Insights,” Cisco, December 2014
Security needs to be as
pervasive as the IoE
itself.
Security needs to be as
pervasive as the IoE itself.
While creating incredible
opportunity this
digital transformation also
presents new challenges…
Attack vectors will increase
65% of companies said they couldn’t stop a breach
because it evaded existing preventative measures
33% of companies took more than 2
years to discover the breach
55% of companies couldn’t identify
where the breach occurred
Source: 2014: Year of Mega Breaches, Ponemon, 2015
Contextual data is
more valuable
The more valuable data/insight
becomes, the more attractive
hacking becomes
New security challenges will arise
Implication
The increasing value of data
is fueling a high-growth
hacker economy
Attackers have increased
their understanding
Hackers relentlessly drive attacks home,
using tools developed specifically to
circumvent chosen security infrastructures
CEO’s Top Challenges
Threat to data
42%
Inability of IT to keep
pace with change
38%
Regulatory
challenges
32% Source: Cisco Consulting Services, 2012
Lawsuits
Security breaches will be increasingly
costly to businesses in the following ways:
Revenue
Intellectual
property
Brand image
Average cost of data
breach in 2014
Average cost of data
breach in 2013
$5.4 million
$4.5 million
Source: Ponemon Institute, 2014
Embedding security everywhere
allows security to become an enabler for
businesses to take full and secure
advantage of opportunities presented
by new digital business
models and the IoE.
Download the Security Whitepaper Download the Midyear Security Report
See how digital transformation
is fueling the next wave of
the Internet

More Related Content

What's hot

The latest top 10 strategic technology trends
The latest top 10 strategic technology trendsThe latest top 10 strategic technology trends
The latest top 10 strategic technology trends
Anh Đảo Lê
 

What's hot (20)

5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
 
IoT market trends and revenue model anatomy
IoT market trends and revenue model anatomyIoT market trends and revenue model anatomy
IoT market trends and revenue model anatomy
 
Developing a Future-Proof IoT Roadmap for Connected Devices and Data
Developing a Future-Proof IoT Roadmap for Connected Devices and DataDeveloping a Future-Proof IoT Roadmap for Connected Devices and Data
Developing a Future-Proof IoT Roadmap for Connected Devices and Data
 
IoT and Retail
IoT and RetailIoT and Retail
IoT and Retail
 
The latest top 10 strategic technology trends
The latest top 10 strategic technology trendsThe latest top 10 strategic technology trends
The latest top 10 strategic technology trends
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Practical Internet of Things Now -- What it is and six requirements for your ...
Practical Internet of Things Now -- What it is and six requirements for your ...Practical Internet of Things Now -- What it is and six requirements for your ...
Practical Internet of Things Now -- What it is and six requirements for your ...
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
Internet of Things (IoT) and SMAC
Internet of Things (IoT) and SMACInternet of Things (IoT) and SMAC
Internet of Things (IoT) and SMAC
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
 
The Financial Impact of BYOD
The Financial Impact of BYODThe Financial Impact of BYOD
The Financial Impact of BYOD
 
Ecosystm IoT combined forecast 2017 - 2022
Ecosystm IoT combined forecast 2017 - 2022Ecosystm IoT combined forecast 2017 - 2022
Ecosystm IoT combined forecast 2017 - 2022
 
Technology Trend 2019
Technology Trend 2019Technology Trend 2019
Technology Trend 2019
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018
 

Similar to Security Everywhere in the Digital Economy

02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
Julie Bridgen
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 

Similar to Security Everywhere in the Digital Economy (20)

02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

More from Connected Futures

Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures
 
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksSummary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Connected Futures
 
A transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasA transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as Coisas
Connected Futures
 
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suitePart 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Connected Futures
 

More from Connected Futures (20)

Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
 
Digital Technologies: Today’s New Crime Fighters
 Digital Technologies: Today’s New Crime Fighters Digital Technologies: Today’s New Crime Fighters
Digital Technologies: Today’s New Crime Fighters
 
Digital Healthcare Providers: Forget Sexy, Focus on Boring
Digital Healthcare Providers: Forget Sexy, Focus on BoringDigital Healthcare Providers: Forget Sexy, Focus on Boring
Digital Healthcare Providers: Forget Sexy, Focus on Boring
 
IT's New Starring Role
IT's New Starring RoleIT's New Starring Role
IT's New Starring Role
 
Notable Quotes from Gartner Symposium/ITxpo
Notable Quotes from Gartner Symposium/ITxpoNotable Quotes from Gartner Symposium/ITxpo
Notable Quotes from Gartner Symposium/ITxpo
 
More Personalization = More Money
More Personalization = More MoneyMore Personalization = More Money
More Personalization = More Money
 
More Digital = More Money
More Digital = More MoneyMore Digital = More Money
More Digital = More Money
 
More Channels = More Money
More Channels = More MoneyMore Channels = More Money
More Channels = More Money
 
More Mobile = More Money
More Mobile = More MoneyMore Mobile = More Money
More Mobile = More Money
 
Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
 
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
 
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksSummary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
 
A transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasA transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as Coisas
 
Improving Healthcare Through Digital Transformation
Improving Healthcare Through Digital TransformationImproving Healthcare Through Digital Transformation
Improving Healthcare Through Digital Transformation
 
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suitePart 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suite
 
Transfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformaciónTransfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformación
 
Verstoren of verstoord worden
Verstoren of verstoord worden Verstoren of verstoord worden
Verstoren of verstoord worden
 
Scegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirlaScegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirla
 
Agir ou subir
Agir ou subirAgir ou subir
Agir ou subir
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Security Everywhere in the Digital Economy

  • 1.
  • 2. Ever-expanding connectivity as a result of modern networks is transforming our world.
  • 3. According to the Global Center for Digital Business Transformation (DBT Center): 4 of today’s top 10 incumbents (in terms of market share) in each industry will be displaced by digital disruption in the next 5 years. Source: Global Center for Digital Business Transformation, IMD and Cisco
  • 4. The Internet of Everything (IoE) is generating unprecedented opportunities for networked connections among people, processes, data, and things. 19 trillion value Source: http://ioeassessment.cisco.com/learn, Cisco
  • 5. We are now facing a similar evolution with respect to security. Security must be everywhere — embedded into the heart of the intelligent network infrastructure and spanning throughout the extended network.
  • 6. In a recent IoT Survey by Cisco Consulting Services that included 1,230 customers globally, when asked … “What are the biggest drawbacks of adopting IoT solutions in your organization?” Customers answered… “Threats to the privacy of our workers and/or customers” “Threats to IT or physical security” Source: “Attaining IoT Value: How To Move from Connecting Things to Capturing Insights,” Cisco, December 2014
  • 7. Security needs to be as pervasive as the IoE itself. Security needs to be as pervasive as the IoE itself.
  • 8. While creating incredible opportunity this digital transformation also presents new challenges…
  • 9. Attack vectors will increase 65% of companies said they couldn’t stop a breach because it evaded existing preventative measures 33% of companies took more than 2 years to discover the breach 55% of companies couldn’t identify where the breach occurred Source: 2014: Year of Mega Breaches, Ponemon, 2015
  • 10. Contextual data is more valuable The more valuable data/insight becomes, the more attractive hacking becomes New security challenges will arise Implication The increasing value of data is fueling a high-growth hacker economy Attackers have increased their understanding Hackers relentlessly drive attacks home, using tools developed specifically to circumvent chosen security infrastructures
  • 11. CEO’s Top Challenges Threat to data 42% Inability of IT to keep pace with change 38% Regulatory challenges 32% Source: Cisco Consulting Services, 2012
  • 12. Lawsuits Security breaches will be increasingly costly to businesses in the following ways: Revenue Intellectual property Brand image
  • 13. Average cost of data breach in 2014 Average cost of data breach in 2013 $5.4 million $4.5 million Source: Ponemon Institute, 2014
  • 14. Embedding security everywhere allows security to become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the IoE.
  • 15. Download the Security Whitepaper Download the Midyear Security Report See how digital transformation is fueling the next wave of the Internet