the 4th industrial revolution and cyber security - evry · the 4th industrial revolution and cyber...
TRANSCRIPT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Updated May 2017
Sven Størmer Thaulow – Adm dir Cisco Norway
The 4th industrial revolution and cyber security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
20-50 bill.Connected
devices
2020
1000Connected
devices
1984
2020 – 40% of all data from
sensors
More data created in 2017
than the last 5000 years..
1992100
GB/day
1997100 GB/t
2002100 GB/s
20072000 GB/s
201626600GB/s
2021105800
GB/s
Global Internet Traffic(Kilde: Cisco VNI Index 2017)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential #CiscoConnect
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Norway
• 600 world class people
• Ciscos largest R&D facility in Europe
• Amongst the largest R&D centers in high tech in Norway
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Norway is the leading force in the world within collaboration – latest outis the Cisco Sparkboard
Hu
man
Pro
gres
s
Time
We are living in exponential times – the ”Die Progress Unit”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
We are in the beginning of the 4th industrial revolution
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The 4th industrial revolution = digitizing all working processes – fueling disruption and higher efficiency
Big data
Cloud
IoTArtificial
Intelligence
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet to the people!
Global Internet Users (MM), 2009 - 2016
Y/Y
% G
row
th
Glo
bal
Inte
rnet
Use
rs (
MM
)
Global Internet Users (MM) Y/Y % Growth
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TIMELINE
2010 2015 2020
BIL
LIO
NS
OF
DEV
ICES
0
10
20
30
50
Adoption rate of digital infrastructure:
5X faster than electricity and telephony
25
12.5
7.26.8 7.6
World Population
50 Billion Smart Objects
Inflectionpoint
Internet to the Things!IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet of people – IP4
=
4,3BN connections onlineGolfball
IoT
Internet of Things – IP6
=
3.4×1038
connections online
3ffe:1900:4545:3:200:f8ff:fe21:67cfIoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Top 10 use cases1. Smart Home
2. Wearables
3. Connected Cars
4. Industrial Internet
5. Smart Cities
6. IoT in Agriculture
7. Smart Retail
8. Energy Engagment
9. IoT in Healthcare
10. IoT in Poultry and Farming
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
We are connecting the industry
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Single Converged IP NetworkSeparate Building System Networks
We are connecting the buildings
Light Fixture Becomes a Data Source; Broken Silos Enables Analytics
Single Converged IP Network for Building and IT Systems
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
We are connecting the cities
▪ Greater Copenhagen Strives for CO2 Neutrality
Smart Parking Smart Light Mobility Monitoring Waste Air Pollution Analytics Soil Sensing
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
We are connecting the electricity grids
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Power stations, Oil rigs…..
All critical infrastructure
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IoT will generate $19 trillion in value acrossall industries in the next decade
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
BUT what if the infrastructure is not SECURE?
Big data
Cloud
ArtificialIntelligence IoTSecurity
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Dangerous Times: World’s biggest data breachesSecurity
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Global INsecurity
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
There is a multi-billion dollar global industry targeting your prized assets
Social Security
$1
MobileMalware
$150
$Bank
Account Info>$1000 depending
on account type and balance
FacebookAccounts$1 for an
account with 15 friends
Credit CardData
$0.25-$60
MalwareDevelopment
$2500(commercial
malware)
DDoS
DDoS asA Service~$7/hour
Spam$50/500K
emails MedicalRecords
>$50
Exploits$1000-$300K
$450 Billionto
$1 Trillion
Digital Disruption Drives the Hacker EconomySecurity
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Challenges in the 4th Digital Revolution
Maintaining security, risk and compliance –
increased attack surface
Staying ahead in a very dynamic threat
landscape
Reducing complexity and fragmentation
in security architecure
Last 20 years of security:
Got a problem?
Buy a Box
Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
DataNGIPS
MalwareSandbox
IAM
Antivirus
IDSFirewall
VPN
NGFW
Time to detection:
100 Days
Attackers Are Exploiting Point Solutions with Increasing Speed Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
58% 57% 57% 57%
The Top 4 Sources of Concern Which Security Professionals Found in Defending Against a Cyberattack
Mobile Devices Data in Public Cloud Cloud Infrastructure
Percentage of respondents who find the category very and extremely challenging to defend
User Behavior
Security
Time
Do you have an effective security posture?
ResponseDetectionThreat
Human behaviour
Holistic securityarchitecture
Consolidation ofsec systems
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
UTM
NetworkAnalytics
Advanced MalwareProtection
Secure Internet Gateway
WebW W W
Network Policies and Access
Firewalls
Cloud Access Security Broker
Cisco utilize artificial intelligence and integrated security architecture to detect threats - TALOS
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Digitization is really about digitizing all working processes in all businesses – fueling disruption
Big data
Cloud
ArtificialIntelligence IoT
YOU ARE HERE
Hu
man
Pro
gres
s
Time
x