SlideShare a Scribd company logo
1 of 23
Download to read offline
January 2016
Cisco 2016
Annual Security Report
Rafael Chavez
Cisco Mexico
Security Sales Manager
The Rise of Digitization is Upon Us
2015 2014 2013
16 billion web requests a day
500 billion emails a day
In aggregate, block almost 20 billion threats per day
• More than 1.1 million unique malware samples daily
18.5 billion AMP queries
A View Across Cisco’s Global Telemetry
Over 2400
Respondents
• CSOs 45%
SecOps 55%
• Large Enterprise 13%
Enterprise 38%
Midmarket 49%
Cisco’s 2015 Security Capabilities Benchmark Study
Conducted
over the
Summer of 2015
Study Included
12 Countries
US
Mexico
Brazil
UK
France
Germany
Italy
Russia
India
Australia
China
Japan
Security Concerns Weigh on the Minds of Executives
Of Executives Very Concerned
About Security
Agreed More Information
Will Be Expected
48%
92%
Much More Concerned
Than 3 Years Ago
41%
Direct Attacks Generate Big Profits
More efficient and more lucrative
DNS: Auld Acquaintance Be Forgot
91.3%of malware uses DNS
68%of organizations
don’t monitor it
A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic
Constraints: Budget, Compatibility, and Certification
Security teams may be limited in their ability to carry out their plans
Maturity Levels – Cisco Security Report 2015
Current Threat Landscape
• Attackers and attacks continue
to be effective
• Defender concern
spurring action
• Regions respond to uncertain
Internet governance
• Fragmented response inhibits
an effective defense.
Industrialization of Cybercrime
Inside the Attacks
Professional Attack Infrastructure
Designed to evade and reconstitute
Browser Infections Persist
More than
85%of the companies studied
were affected each month
Confidence is declining, but awareness is driving action
Inside the Defenses
Mixed Confidence in Defense Capabilities
59%confident in having the
latest technology
51%have strong confidence in
ability to detect a security
weakness in advance
54%have strong confidence
in ability to defend
against attacks
45%have strong confidence
in ability to scope and
contain an attack
54%have strong confidence in
ability to verify an attack
56%review security policies
on a regular basis
-5% +0% -4%
-1% +0% +0%
Inherent Risk in the Infrastructure
of devices surveyed across the
Internet were running known
vulnerabilities with an average
of 26 each
of devices surveyed across the
Internet were End of Service
of devices surveyed across the
Internet were End of Life
92%
31%
5%
Security Awareness and Training
Formal Written Policies
Outsource Audit and Consulting
Outsource Incident Response
Outsource Threat Intelligence
Defenders are Responding
More organizations are taking actions to become more prepared for what’s going to happen.
90%
66%
52%
42%
39%
+1%
+7%
+1%
+7%
N/A
Encrypted Traffic: A Sign of the Times
Individual Privacy Government Compliance
Organization Security
Encrypted Traffic is Increasing
It represents over 50% of bytes transferred
https://
The growing trend of web encryption creates false sense of security and blind spots for defenders
Collaboration is Critical
Actionable collaboration is needed
between people, processes, and
technology, and on the back-end
infrastructure that attackers are using.
Processes
People
Technology
Trust, But Verify
Technology vendors need to demonstrate trustworthiness by:
Creating a
Security-Aware
Culture
Providing Rapid
Remediation
Responding to
Breaches
Quickly
Following
Policies and
Processes
Building
Security Into
Their Solutions
1. Richer network and security architecture needed
2. Best-in-class technology alone cannot deal with threat landscape
3. Integrated threat defense can converge on encrypted malicious activities
4. Open APIs are crucial
5. Requires less gear and software to install and manage
6. Automation and coordination aspects help to reduce TTD, containment,
and remediation
Six Tenets of an Integrated Threat Defense
2016 Annual Security Report
Attackers are tapping into
legitimate resources, becoming
adept at deploying hard-to-detect
and highly profitable campaigns
Defenders confidence is
declining, but awareness
is driving action to
deploy new strategies
Collaboration is needed to
combat today’s innovative and
persistent attacks and develop
architecture for tomorrow
Thank You

More Related Content

What's hot

The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 

What's hot (20)

Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
Sample Incident Response Plan
Sample Incident Response PlanSample Incident Response Plan
Sample Incident Response Plan
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security To Catch a Phish, or: Why You Must Automate Email Security
To Catch a Phish, or: Why You Must Automate Email Security
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 

Viewers also liked

SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
Fernanda Ramírez
 

Viewers also liked (20)

Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Firewall
FirewallFirewall
Firewall
 
U.3 .- Seguridad en redes de comunicación.
U.3 .- Seguridad en redes de comunicación.U.3 .- Seguridad en redes de comunicación.
U.3 .- Seguridad en redes de comunicación.
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Q1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondQ1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and Beyond
 
Presupuestos de una empresa y rentabilidad combinanda
Presupuestos de una empresa y rentabilidad combinandaPresupuestos de una empresa y rentabilidad combinanda
Presupuestos de una empresa y rentabilidad combinanda
 
Monitoreo y-gestion-de-redes
Monitoreo y-gestion-de-redesMonitoreo y-gestion-de-redes
Monitoreo y-gestion-de-redes
 
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
SISTEMAS DE SEGURIDAD, TELECOMUNICACIONES,
 
seguridad en telecomunicaciones
seguridad en telecomunicacionesseguridad en telecomunicaciones
seguridad en telecomunicaciones
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 

Similar to Reporte de Seguridad de Cisco 2016

EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
Peggy Lawless
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)
Robert Greer
 

Similar to Reporte de Seguridad de Cisco 2016 (20)

Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, Scudieri
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 

More from Oscar Romano

VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016
Oscar Romano
 
20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global
Oscar Romano
 
Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014
Oscar Romano
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Oscar Romano
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Oscar Romano
 

More from Oscar Romano (15)

Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDCEstudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
 
VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016
 
Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016
 
Conectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXIConectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXI
 
Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)
 
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 "Transformación digital. Redes listas para la Era de la Internet de las Cosas" "Transformación digital. Redes listas para la Era de la Internet de las Cosas"
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
 
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
 
20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014
 
Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Reporte de Seguridad de Cisco 2016

  • 1. January 2016 Cisco 2016 Annual Security Report Rafael Chavez Cisco Mexico Security Sales Manager
  • 2. The Rise of Digitization is Upon Us 2015 2014 2013
  • 3. 16 billion web requests a day 500 billion emails a day In aggregate, block almost 20 billion threats per day • More than 1.1 million unique malware samples daily 18.5 billion AMP queries A View Across Cisco’s Global Telemetry
  • 4. Over 2400 Respondents • CSOs 45% SecOps 55% • Large Enterprise 13% Enterprise 38% Midmarket 49% Cisco’s 2015 Security Capabilities Benchmark Study Conducted over the Summer of 2015 Study Included 12 Countries US Mexico Brazil UK France Germany Italy Russia India Australia China Japan
  • 5. Security Concerns Weigh on the Minds of Executives Of Executives Very Concerned About Security Agreed More Information Will Be Expected 48% 92% Much More Concerned Than 3 Years Ago 41%
  • 6. Direct Attacks Generate Big Profits More efficient and more lucrative
  • 7. DNS: Auld Acquaintance Be Forgot 91.3%of malware uses DNS 68%of organizations don’t monitor it A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic
  • 8. Constraints: Budget, Compatibility, and Certification Security teams may be limited in their ability to carry out their plans
  • 9. Maturity Levels – Cisco Security Report 2015
  • 10. Current Threat Landscape • Attackers and attacks continue to be effective • Defender concern spurring action • Regions respond to uncertain Internet governance • Fragmented response inhibits an effective defense.
  • 12. Professional Attack Infrastructure Designed to evade and reconstitute
  • 13. Browser Infections Persist More than 85%of the companies studied were affected each month
  • 14. Confidence is declining, but awareness is driving action Inside the Defenses
  • 15. Mixed Confidence in Defense Capabilities 59%confident in having the latest technology 51%have strong confidence in ability to detect a security weakness in advance 54%have strong confidence in ability to defend against attacks 45%have strong confidence in ability to scope and contain an attack 54%have strong confidence in ability to verify an attack 56%review security policies on a regular basis -5% +0% -4% -1% +0% +0%
  • 16. Inherent Risk in the Infrastructure of devices surveyed across the Internet were running known vulnerabilities with an average of 26 each of devices surveyed across the Internet were End of Service of devices surveyed across the Internet were End of Life 92% 31% 5%
  • 17. Security Awareness and Training Formal Written Policies Outsource Audit and Consulting Outsource Incident Response Outsource Threat Intelligence Defenders are Responding More organizations are taking actions to become more prepared for what’s going to happen. 90% 66% 52% 42% 39% +1% +7% +1% +7% N/A
  • 18. Encrypted Traffic: A Sign of the Times Individual Privacy Government Compliance Organization Security Encrypted Traffic is Increasing It represents over 50% of bytes transferred https:// The growing trend of web encryption creates false sense of security and blind spots for defenders
  • 19. Collaboration is Critical Actionable collaboration is needed between people, processes, and technology, and on the back-end infrastructure that attackers are using. Processes People Technology
  • 20. Trust, But Verify Technology vendors need to demonstrate trustworthiness by: Creating a Security-Aware Culture Providing Rapid Remediation Responding to Breaches Quickly Following Policies and Processes Building Security Into Their Solutions
  • 21. 1. Richer network and security architecture needed 2. Best-in-class technology alone cannot deal with threat landscape 3. Integrated threat defense can converge on encrypted malicious activities 4. Open APIs are crucial 5. Requires less gear and software to install and manage 6. Automation and coordination aspects help to reduce TTD, containment, and remediation Six Tenets of an Integrated Threat Defense
  • 22. 2016 Annual Security Report Attackers are tapping into legitimate resources, becoming adept at deploying hard-to-detect and highly profitable campaigns Defenders confidence is declining, but awareness is driving action to deploy new strategies Collaboration is needed to combat today’s innovative and persistent attacks and develop architecture for tomorrow