Oran – 4 Avril 2018
Consultant Securite Afrique
Cisco 2018
Annual Cybersecurity Report
Tendances Chez les Attaquants et
chez les Defendants
Babacar Wagne
2018 Annual Cybersecurity Report
• Unprecedented levels of sophistication and impact
• Becoming more adept at evasion
• Exploiting new technology security gaps
2018 Annual Cybersecurity Report
• Visibilite – Traffic Encrypte
Malicious Binaries and Encryption
Increase
November 2016
Attackers embrace encryption to conceal their command-and-control activity
19%
12% Increase
268%70%
50%
38%
Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption
October 2017
2018 Annual Cybersecurity Report
• What files are being used in mails?
Malicious Documents in Email
January-May June-October
Compared usage of malicious attachments from first portion of 2017 to second
Office
55%
Archive
415%
PDF
255%
2018 Annual Cybersecurity Report
• Techniques d’evasion dans les Sandboxes
Sandbox Evasion Patterns
Attackers are constantly testing sandbox evasion techniques
Document Close
Doc Embedded
in PDF
Malicious Samples Total Samples
Oct 2016
Volume
Volume
Oct 2017 Oct 2016 Oct 2017
2018 Annual Cybersecurity Report
• Nouveaux Types de Malware
Network-based Ransomware
Network-Based
Ransomware
Worm
WannaCry and Nyetya: rapid-moving, self-propagating network-based attacks
With active, unpatched machines, these automated worms
will attack again. Have you secured your network?
2018 Annual Cybersecurity Report
• Utilisation du Cloud
53%
manage over half of
their infrastructure in
the cloud
Ease of use (46%)
Scalability (48%)
Lack of internal workforce (41%)
Better security (57%)
Appeal:
The Cloud
Organizations increase reliance on the cloud
Malicious Use of Legitimate Resources
Adaptability
Subverts Domain and
Certificate Intelligence
Easy Setup
Whitelisted
IP Address
Cybercriminals are adopting command-and-control channels that rely on legitimate
Internet services, making malware traffic almost impossible to shut down
Reduce Burning Infrastructure
Leverage
Encryption for C2
Source: Anomali
2018 Annual Cybersecurity Report
• DDoS
IoT and DDos
Application-layer attacks
are rising, network-layer
attacks are declining
Burst attacks are
increasing
Amplification attacks
• Complexity
• Frequency
• Duration
2/5of businesses experienced a
reflection amplification attack in
2017
of those organizations
mitigated the attacks2/3
Source: Radware
2018 Annual Cybersecurity Report
• Utilisation des Domaines
How Malicious Actors Leverage Domains
60%Spam
20%Malvertising
20%Other
Organizations need to minimize access to malicious domains
Type of Attack
RLD Registered
Times
New or Reused
Domains
80%
More than
1 week
20%
Less than
1 week
42%
New
58%
Reused
2018 Annual Cybersecurity Report
• Menace Interne
Insider Threat
Machine learning algorithms can greatly help detect internal malicious actors
62%
occur outside of
normal work hours
5200
docs per user /
1.5 months
PDFs
were the most
common file type
“Data”
was the most popular
keyword in doc titles
High*
accuracy of malicious activity
detection since June 2017
2018 Annual Cybersecurity Report
• IOT
IT/OT Attack Sentiment
69%
of organizations believe
OT is a viable attack
vector in 2018
• 20% believe it will be
eventually
• 10% believe it will remain
in IT alone
ICS Vulnerabilities
Being Connected
to the Internet
Known Vulnerabilities
Rarely Patched
Lack of
Knowledge
Too Specialized
USB or DVD as Entry Point
Threat actors are actively engaged in
researching pivot points to facilitate
future attacks
Source: TrapX
2018 Annual Cybersecurity Report
• Vulnerability Management
We need a better way to improve patch management processes
High Severity Vulnerabilities and Patch Management
High severity is driven by headlines
MS17-010 Detections
Patches double as organizations
realize potential threat
Exploited vulnerability
makes headlines
Microsoft warns
of vulnerability
NumberofDetections
Month Source: Qualys
2018 Annual Cybersecurity Report
• Gestion des alertes par les Defendants
Alerts
44%of Alerts are
NOT Investigated
8%
Experienced NO
Security Alert
56%
of Alerts are
Investigated
34%
of Investigated
Alerts are
Legitimate
51%
of Legitimate Alerts
are Remediated
93%
Experienced
Security Alert
Uninvestigated alerts still create huge business risk
49%of Legitimate Alerts are
NOT Remediated
2018 Annual Cybersecurity Report
• Orchestration
Orchestration Challenges
8% 10% 21% 43% 55%
1-5 6-10 11-20 21-50 50+
Very Challenging 17% 24% 16% 42% 14% 25% 19% 14% 12% 27%
Education
Financial
Services
Government Healthcare Manufacturing Pharma Retail Telecom Transportation
Utility/
Energy
As the number of vendors increases, orchestration challenges grow
2018 Annual Cybersecurity Report
• Defenders Still use Best of Breed Approach
Defenders Still Favor Best of Breed
72%use best-of-
breed
28%use single vendor
solution
vs.
2018 Annual Cybersecurity Report
• Defenders Approach
Strategic, Operational, and Tactical Issues
26%
can be addressed
by products alone
74%
might also require
people and/or
processes to address
People
Products Policies
An overemphasis on
product solutions can leave
openings for attackers
The Need for Outsourcing
In order to keep up, organizations are looking for outside help
54%
Consulting
(up 3%)
49%
Monitoring
(up 5%)
47%
Incident Response
(up 2%)
Most Frequently
Outsourced Services
Market Expectations: Threat Landscape
The threat landscape to remain complex and
challenging
• Few predict radically new threats on the horizon, but they
see more capable and more diabolical bad actors
• Believe they’ll need ever more sophisticated security
arsenals to keep they at bay
Market Expectations: Modern Workplace
The modern workplace will continue to create
conditions that favor the attackers
• The footprint security executives must secure continues to
expand
• Employees increasingly carry their work (and the
company’s data) with them wherever they go—a well-
documented source of exposure
• Clients, partners and suppliers all need secure access to
corporate resources
• With the increasing deployment of IoT sensors, etc.,
companies’ interfaces to the internet will multiply
dramatically
Market Expectations: Scrutiny
Additional scrutiny of their ability to secure
the organization
• Many expect they’ll be under additional scrutiny—from
regulators, executives, stakeholders, partners and clients
• Top scrutiny from Executive Leadership, Clients, and
Business Partners (76%, each)
• Several CISOs mention that the need to meet others’
expectations for accessibility puts increasing strains on staff
• Current and potential clients can be particularly demanding
of information regarding security processes and protocols
Market Expectations: Breaches Drive Budget
Budgets will remain stable, unless a security
breach drives unexpected investment
• 51%: Budgets based on previous year’s budget
• 51%: Organization’s security outcome objective
• 46%: Percent of revenue
• 47%: Breach drove improvements to a great extent
!
Market Expectations: AI and Machine Learning
More spending on AI/ML capabilities
• AI, ML and automation are all increasingly desired and
expected
• 83%: Reliant on automation to reduce the level of effort to
secure the organization
• 74%: Reliant on AI to reduce the level of effort to secure
the organization
• CISOs expect to take increasing advantage of AI and
robotics
Market Expectations: Outsourcing
More reliance on outsourcing services
• 53%: More cost efficient
• 52%: Desire for more unbiased insight
• 51%: More timely response to incidents
Observed Threats and TTD
Cloud-based security technology has been a key factor in helping Cisco
maintain a low median despite an increase in threat samples
Cisco Annual Median TTD
(Hours)
37.1
14
4.6
2015 2016 2017
Number of Observed Threat Samples
10x
Increase
2016 2017
Adversary tactics are continuously evolving, using encryption and legitimate Internet
services to conceal their activity and undermine traditional security technologies
Lead from the top: executives/board set the security tone, culture
Top 7 Actions:
. Educate by roles for maximum benefit
. Adhere to corporate policies, practices for application, system, and appliance patching
. Assume ownership of IoT device security and add scanning for these devices to security reviews
. Review, practice security response procedures
. Back up data often, test restoration procedures
. Review third-party efficacy testing of security technologies to reduce risk of supply chain attacks
. Conduct security scanning of micro-service, cloud service, and application administration systems
Conclusion/Recommendations
Download the Cisco 2018
Annual Cybersecurity Report
cisco.com/go/acr2018

More Related Content

PDF
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
PDF
Cyber Security Maturity Assessment
PDF
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
PPTX
2018 Trends in Cybersecurity: Building Effective Security Teams
PPTX
Cyber Attack Survival
PPTX
Rise of Ransomware
PPTX
FireHost Webinar: Protect Your Application With Intelligent Security
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
[Webinar] Supercharging Security with Behavioral Analytics
Cyber Security Maturity Assessment
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
2018 Trends in Cybersecurity: Building Effective Security Teams
Cyber Attack Survival
Rise of Ransomware
FireHost Webinar: Protect Your Application With Intelligent Security

What's hot (20)

PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PPTX
Community IT Webinar: Working with an Outsourced IT Manager
PPTX
Insights from 2016 Cyberthreat Defense Report
PDF
5 Key Findings on Advanced Threats
PDF
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
PPTX
Survey: Insider Threats and Cyber Security
PDF
Cisco Connect 2018 Philippines - security keynote
PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PPTX
Imperva ppt
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
Cyber Security in the market place: HP CTO Day
PPTX
The State of Ransomware 2020
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PPTX
Edgescan 2021 Vulnerability Stats Report
PPTX
Community IT - Crafting Nonprofit IT Security Policy
PPT
Security metrics 2
PPTX
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
PPTX
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
PPTX
Cybersecurity Training for Nonprofits
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Community IT Webinar: Working with an Outsourced IT Manager
Insights from 2016 Cyberthreat Defense Report
5 Key Findings on Advanced Threats
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Survey: Insider Threats and Cyber Security
Cisco Connect 2018 Philippines - security keynote
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva ppt
Companies Aware, but Not Prepared for GDPR
Cyber Security in the market place: HP CTO Day
The State of Ransomware 2020
Final presentation january iia cybersecurity securing your 2016 audit plan
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Edgescan 2021 Vulnerability Stats Report
Community IT - Crafting Nonprofit IT Security Policy
Security metrics 2
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Cybersecurity Training for Nonprofits
Ad

Similar to Conférence CISCO ACSS 2018 (20)

PPTX
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
PDF
Cybersecurity Quarterly Benchmarks Q1 2022
PPTX
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
PDF
Security Incident Response Readiness Survey
PDF
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
PDF
Reporte de Seguridad de Cisco 2016
PDF
The top challenges to expect in network security in 2019 survey report
PDF
Eliminate the 49% of Documents that Contain Data Breaches Webinar
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PDF
Check point security stock pitch greer, scudieri (1) (1)
PDF
Check Point Software Stock Pitch Greer, Scudieri
PDF
Emerging Trends in Application Security
PPTX
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
PDF
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
PPTX
ITIL Basic introduction for the beginners
PPTX
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
PPTX
CompTIA International Trends in Cybersecurity
PDF
2024-Cybersecurity-Outlook for all engineering students
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
Nonprofit Cybersecurity Risk Assessment Basics
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Cybersecurity Quarterly Benchmarks Q1 2022
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Security Incident Response Readiness Survey
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Reporte de Seguridad de Cisco 2016
The top challenges to expect in network security in 2019 survey report
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Check point security stock pitch greer, scudieri (1) (1)
Check Point Software Stock Pitch Greer, Scudieri
Emerging Trends in Application Security
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
ITIL Basic introduction for the beginners
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
CompTIA International Trends in Cybersecurity
2024-Cybersecurity-Outlook for all engineering students
Cyber Risk Management in 2017: Challenges & Recommendations
Nonprofit Cybersecurity Risk Assessment Basics
Ad

More from African Cyber Security Summit (20)

PDF
Bilan & Perspectives #ACSS2019
PDF
Rapport de Visibilité #ACSS2019
PDF
Atelier Technique - F5 - #ACSS2019
PDF
Atelier Technique - F5 - #ACSS2019
PPTX
Atelier Technique - Symantec - #ACSS2019
PPTX
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
PPTX
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
PPTX
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
PPTX
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
PPTX
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
PPTX
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
PDF
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
PPTX
Conférence - Digital Identity and Blockchain - #ACSS2019
PDF
Bilan & Perspectives - ACSS 2018
PDF
Rapport de Visibilité ACCS 2018
PDF
Atelier Technique CISCO ACSS 2018
PDF
Atelier Technique SYMANTEC ACSS 2018
PDF
Atelier Technique MANAGE ENGINE ACSS 2018
PDF
Atelier Technique EXTREME NETWORKS ACSS 2018
PDF
Atelier Technique WALLIX ACSS 2018
Bilan & Perspectives #ACSS2019
Rapport de Visibilité #ACSS2019
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Digital Identity and Blockchain - #ACSS2019
Bilan & Perspectives - ACSS 2018
Rapport de Visibilité ACCS 2018
Atelier Technique CISCO ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique MANAGE ENGINE ACSS 2018
Atelier Technique EXTREME NETWORKS ACSS 2018
Atelier Technique WALLIX ACSS 2018

Recently uploaded (20)

PDF
Books and book chapters(CITATIONS AND REFERENCING) (LORENA).pdf
PPT
Lessons from Presentation Zen_ how to craft your story visually
PDF
soft skills for kids in India - LearnifyU
PPTX
Ease_of_Paying_Taxes_Act_Presentation.pptx
PDF
Lessons Learned building a product with clean core abap
PPTX
Ulangan Harian_TEOREMA PYTHAGORAS_8.pptx
PDF
Ch-5.pdf important formulas requires for class 12
PPTX
Staff WelFare Presentation for Larger Organizations
PDF
Yoken Capital Network Presentation Slide
PDF
Pitch Perfect Minimal Presentation for PPT
DOCX
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
PPTX
Animal Farm powerpointpresentation- Kopie – Kopie.pptx
PPTX
RP Virtual Session One intro to workplace readiness
PPTX
Challenges, strengths and prospects of Pakistan in.pptx
PPTX
Ruth Week 1 - Hope in Barren Places.pptx
PPTX
HOW TO HANDLE THE STAGE FOR ACADEMIA AND OTHERS.pptx
PPTX
Brief presentation for multiple products
PPTX
Lesson 1 (Digital Media) - Multimedia.pptx
PPTX
Paraphrasing Sentence To Make Your Writing More Interesting
PDF
Echoes of AccountabilityComputational Analysis of Post-Junta Parliamentary Qu...
Books and book chapters(CITATIONS AND REFERENCING) (LORENA).pdf
Lessons from Presentation Zen_ how to craft your story visually
soft skills for kids in India - LearnifyU
Ease_of_Paying_Taxes_Act_Presentation.pptx
Lessons Learned building a product with clean core abap
Ulangan Harian_TEOREMA PYTHAGORAS_8.pptx
Ch-5.pdf important formulas requires for class 12
Staff WelFare Presentation for Larger Organizations
Yoken Capital Network Presentation Slide
Pitch Perfect Minimal Presentation for PPT
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
Animal Farm powerpointpresentation- Kopie – Kopie.pptx
RP Virtual Session One intro to workplace readiness
Challenges, strengths and prospects of Pakistan in.pptx
Ruth Week 1 - Hope in Barren Places.pptx
HOW TO HANDLE THE STAGE FOR ACADEMIA AND OTHERS.pptx
Brief presentation for multiple products
Lesson 1 (Digital Media) - Multimedia.pptx
Paraphrasing Sentence To Make Your Writing More Interesting
Echoes of AccountabilityComputational Analysis of Post-Junta Parliamentary Qu...

Conférence CISCO ACSS 2018

  • 1. Oran – 4 Avril 2018 Consultant Securite Afrique Cisco 2018 Annual Cybersecurity Report Tendances Chez les Attaquants et chez les Defendants Babacar Wagne
  • 2. 2018 Annual Cybersecurity Report • Unprecedented levels of sophistication and impact • Becoming more adept at evasion • Exploiting new technology security gaps
  • 3. 2018 Annual Cybersecurity Report • Visibilite – Traffic Encrypte
  • 4. Malicious Binaries and Encryption Increase November 2016 Attackers embrace encryption to conceal their command-and-control activity 19% 12% Increase 268%70% 50% 38% Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption October 2017
  • 5. 2018 Annual Cybersecurity Report • What files are being used in mails?
  • 6. Malicious Documents in Email January-May June-October Compared usage of malicious attachments from first portion of 2017 to second Office 55% Archive 415% PDF 255%
  • 7. 2018 Annual Cybersecurity Report • Techniques d’evasion dans les Sandboxes
  • 8. Sandbox Evasion Patterns Attackers are constantly testing sandbox evasion techniques Document Close Doc Embedded in PDF Malicious Samples Total Samples Oct 2016 Volume Volume Oct 2017 Oct 2016 Oct 2017
  • 9. 2018 Annual Cybersecurity Report • Nouveaux Types de Malware
  • 10. Network-based Ransomware Network-Based Ransomware Worm WannaCry and Nyetya: rapid-moving, self-propagating network-based attacks With active, unpatched machines, these automated worms will attack again. Have you secured your network?
  • 11. 2018 Annual Cybersecurity Report • Utilisation du Cloud
  • 12. 53% manage over half of their infrastructure in the cloud Ease of use (46%) Scalability (48%) Lack of internal workforce (41%) Better security (57%) Appeal: The Cloud Organizations increase reliance on the cloud
  • 13. Malicious Use of Legitimate Resources Adaptability Subverts Domain and Certificate Intelligence Easy Setup Whitelisted IP Address Cybercriminals are adopting command-and-control channels that rely on legitimate Internet services, making malware traffic almost impossible to shut down Reduce Burning Infrastructure Leverage Encryption for C2 Source: Anomali
  • 14. 2018 Annual Cybersecurity Report • DDoS
  • 15. IoT and DDos Application-layer attacks are rising, network-layer attacks are declining Burst attacks are increasing Amplification attacks • Complexity • Frequency • Duration 2/5of businesses experienced a reflection amplification attack in 2017 of those organizations mitigated the attacks2/3 Source: Radware
  • 16. 2018 Annual Cybersecurity Report • Utilisation des Domaines
  • 17. How Malicious Actors Leverage Domains 60%Spam 20%Malvertising 20%Other Organizations need to minimize access to malicious domains Type of Attack RLD Registered Times New or Reused Domains 80% More than 1 week 20% Less than 1 week 42% New 58% Reused
  • 18. 2018 Annual Cybersecurity Report • Menace Interne
  • 19. Insider Threat Machine learning algorithms can greatly help detect internal malicious actors 62% occur outside of normal work hours 5200 docs per user / 1.5 months PDFs were the most common file type “Data” was the most popular keyword in doc titles High* accuracy of malicious activity detection since June 2017
  • 20. 2018 Annual Cybersecurity Report • IOT
  • 21. IT/OT Attack Sentiment 69% of organizations believe OT is a viable attack vector in 2018 • 20% believe it will be eventually • 10% believe it will remain in IT alone
  • 22. ICS Vulnerabilities Being Connected to the Internet Known Vulnerabilities Rarely Patched Lack of Knowledge Too Specialized USB or DVD as Entry Point Threat actors are actively engaged in researching pivot points to facilitate future attacks Source: TrapX
  • 23. 2018 Annual Cybersecurity Report • Vulnerability Management
  • 24. We need a better way to improve patch management processes High Severity Vulnerabilities and Patch Management High severity is driven by headlines MS17-010 Detections Patches double as organizations realize potential threat Exploited vulnerability makes headlines Microsoft warns of vulnerability NumberofDetections Month Source: Qualys
  • 25. 2018 Annual Cybersecurity Report • Gestion des alertes par les Defendants
  • 26. Alerts 44%of Alerts are NOT Investigated 8% Experienced NO Security Alert 56% of Alerts are Investigated 34% of Investigated Alerts are Legitimate 51% of Legitimate Alerts are Remediated 93% Experienced Security Alert Uninvestigated alerts still create huge business risk 49%of Legitimate Alerts are NOT Remediated
  • 27. 2018 Annual Cybersecurity Report • Orchestration
  • 28. Orchestration Challenges 8% 10% 21% 43% 55% 1-5 6-10 11-20 21-50 50+ Very Challenging 17% 24% 16% 42% 14% 25% 19% 14% 12% 27% Education Financial Services Government Healthcare Manufacturing Pharma Retail Telecom Transportation Utility/ Energy As the number of vendors increases, orchestration challenges grow
  • 29. 2018 Annual Cybersecurity Report • Defenders Still use Best of Breed Approach
  • 30. Defenders Still Favor Best of Breed 72%use best-of- breed 28%use single vendor solution vs.
  • 31. 2018 Annual Cybersecurity Report • Defenders Approach
  • 32. Strategic, Operational, and Tactical Issues 26% can be addressed by products alone 74% might also require people and/or processes to address People Products Policies An overemphasis on product solutions can leave openings for attackers
  • 33. The Need for Outsourcing In order to keep up, organizations are looking for outside help 54% Consulting (up 3%) 49% Monitoring (up 5%) 47% Incident Response (up 2%) Most Frequently Outsourced Services
  • 34. Market Expectations: Threat Landscape The threat landscape to remain complex and challenging • Few predict radically new threats on the horizon, but they see more capable and more diabolical bad actors • Believe they’ll need ever more sophisticated security arsenals to keep they at bay
  • 35. Market Expectations: Modern Workplace The modern workplace will continue to create conditions that favor the attackers • The footprint security executives must secure continues to expand • Employees increasingly carry their work (and the company’s data) with them wherever they go—a well- documented source of exposure • Clients, partners and suppliers all need secure access to corporate resources • With the increasing deployment of IoT sensors, etc., companies’ interfaces to the internet will multiply dramatically
  • 36. Market Expectations: Scrutiny Additional scrutiny of their ability to secure the organization • Many expect they’ll be under additional scrutiny—from regulators, executives, stakeholders, partners and clients • Top scrutiny from Executive Leadership, Clients, and Business Partners (76%, each) • Several CISOs mention that the need to meet others’ expectations for accessibility puts increasing strains on staff • Current and potential clients can be particularly demanding of information regarding security processes and protocols
  • 37. Market Expectations: Breaches Drive Budget Budgets will remain stable, unless a security breach drives unexpected investment • 51%: Budgets based on previous year’s budget • 51%: Organization’s security outcome objective • 46%: Percent of revenue • 47%: Breach drove improvements to a great extent !
  • 38. Market Expectations: AI and Machine Learning More spending on AI/ML capabilities • AI, ML and automation are all increasingly desired and expected • 83%: Reliant on automation to reduce the level of effort to secure the organization • 74%: Reliant on AI to reduce the level of effort to secure the organization • CISOs expect to take increasing advantage of AI and robotics
  • 39. Market Expectations: Outsourcing More reliance on outsourcing services • 53%: More cost efficient • 52%: Desire for more unbiased insight • 51%: More timely response to incidents
  • 40. Observed Threats and TTD Cloud-based security technology has been a key factor in helping Cisco maintain a low median despite an increase in threat samples Cisco Annual Median TTD (Hours) 37.1 14 4.6 2015 2016 2017 Number of Observed Threat Samples 10x Increase 2016 2017
  • 41. Adversary tactics are continuously evolving, using encryption and legitimate Internet services to conceal their activity and undermine traditional security technologies Lead from the top: executives/board set the security tone, culture Top 7 Actions: . Educate by roles for maximum benefit . Adhere to corporate policies, practices for application, system, and appliance patching . Assume ownership of IoT device security and add scanning for these devices to security reviews . Review, practice security response procedures . Back up data often, test restoration procedures . Review third-party efficacy testing of security technologies to reduce risk of supply chain attacks . Conduct security scanning of micro-service, cloud service, and application administration systems Conclusion/Recommendations
  • 42. Download the Cisco 2018 Annual Cybersecurity Report cisco.com/go/acr2018