SlideShare a Scribd company logo
1 of 11
Becoming Cyber Resilient in
Today’s Internet of Everything
Landscape
#FutureOfIT #Security
Jason Brvenik
Principal Engineer in Cisco's Security
Business Group
Future of IT Podcast Featuring:
Mike Spanbauer
Vice President of Research at
NSS Labs
“You cannot prevent every attack, whether
it's simply due to a rapidly evolving attack
surface within your environment or the talents
of the adversarial side, the reality is that,
these attacks are likely to get through in
spite of best efforts.”
Source: Mike Spanbauer, Vice
President of Research at NSS Labs
#FutureOfIT #Security
“The easiest thing to do is to ask yourself a
simple question: if you knew you were going
to be compromised, would you do security
differently? And surprisingly, a lot of people
haven’t thought about it in this construct.”
#FutureOfIT
Source: Jason Brvenik , Principal
Engineer in Cisco's Security Business Group
#Security
“In essence, the approach today is generally
flawed, you cannot block or detect 100%
of everything. It's unrealistic, and the reason
being very simple- vulnerability is discovered,
and the fact is that the number of apps in the
organization, whether that be unique vendors
or version of those apps, such as Java
engines and so forth, constantly shift.”
#FutureOfIT
Source: Mike Spanbauer, Vice
President of Research at NSS Labs
#Security
“You realize the problem fundamentally is
threats, the community of developers…
they're no longer one office or people
seeking compromises, they are not
criminal organizations in nations and
states with a goal. They have compensation
structures, they have targets and NBO's
and bonuses, and they focus on this. They
do this for a living.”
#FutureOfIT
Source: Jason Brvenik , Principal
Engineer in Cisco's Security Business Group
#Security
“The losses are far greater, and the breaches
are increasing at incredible pace, 30% year
over year compounded. The fact is, they're
growing more frequent.”
#FutureOfIT
Source: Mike Spanbauer, Vice
President of Research at NSS Labs
#Security
“There are a number of technologies that
apply really well here especially in the
forensic phase. And that's our protection
with its retrospective security, the ability
to reach back in time and understand what
happened in the light of new information.”
#FutureOfIT
Source: Jason Brvenik , Principal
Engineer in Cisco's Security Business Group
#Security
Click this button to share this
SlideShare.
#DigitalTransformation
Digital transformation requires
companies to think of the Internet
as the Internet of Everything.
We're ready. Are you?
Call us 1-866-428-9594
More about the Future of IT:
Read Jason Brvenik’s blog: NSS Labs Report on Cyber
Resilience Highlights the Need for a New Approach to
Security
Listen to Future of IT Podcast
Subscribe to the Future of IT Podcast Channel via iTunes
#FutureOfIT #Security

More Related Content

More from Connected Futures

Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2Connected Futures
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of ThingsConnected Futures
 
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures
 
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksSummary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksConnected Futures
 
A transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasA transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasConnected Futures
 
Improving Healthcare Through Digital Transformation
Improving Healthcare Through Digital TransformationImproving Healthcare Through Digital Transformation
Improving Healthcare Through Digital TransformationConnected Futures
 
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suitePart 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suiteConnected Futures
 
Transfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformaciónTransfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformaciónConnected Futures
 
Verstoren of verstoord worden
Verstoren of verstoord worden Verstoren of verstoord worden
Verstoren of verstoord worden Connected Futures
 
Scegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirlaScegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirlaConnected Futures
 
Digital Transformation in Retail
Digital Transformation in RetailDigital Transformation in Retail
Digital Transformation in RetailConnected Futures
 
Retail Value at Stake Infographic
Retail Value at Stake InfographicRetail Value at Stake Infographic
Retail Value at Stake InfographicConnected Futures
 
Superare gli ostacoli nella trasformazione digitale
Superare gli ostacoli nella trasformazione digitaleSuperare gli ostacoli nella trasformazione digitale
Superare gli ostacoli nella trasformazione digitaleConnected Futures
 
The Tide is Changing: The Importance of Digital for Your Community
The Tide is Changing: The Importance of Digital for Your CommunityThe Tide is Changing: The Importance of Digital for Your Community
The Tide is Changing: The Importance of Digital for Your CommunityConnected Futures
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital EconomyConnected Futures
 

More from Connected Futures (20)

More Channels = More Money
More Channels = More MoneyMore Channels = More Money
More Channels = More Money
 
More Mobile = More Money
More Mobile = More MoneyMore Mobile = More Money
More Mobile = More Money
 
Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
 
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
 
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksSummary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
 
A transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasA transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as Coisas
 
Improving Healthcare Through Digital Transformation
Improving Healthcare Through Digital TransformationImproving Healthcare Through Digital Transformation
Improving Healthcare Through Digital Transformation
 
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suitePart 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suite
 
Transfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformaciónTransfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformación
 
Verstoren of verstoord worden
Verstoren of verstoord worden Verstoren of verstoord worden
Verstoren of verstoord worden
 
Scegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirlaScegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirla
 
Agir ou subir
Agir ou subirAgir ou subir
Agir ou subir
 
Digital Transformation in Retail
Digital Transformation in RetailDigital Transformation in Retail
Digital Transformation in Retail
 
Retail Value at Stake Infographic
Retail Value at Stake InfographicRetail Value at Stake Infographic
Retail Value at Stake Infographic
 
Disrupt or be disrupted
Disrupt or be disruptedDisrupt or be disrupted
Disrupt or be disrupted
 
Superare gli ostacoli nella trasformazione digitale
Superare gli ostacoli nella trasformazione digitaleSuperare gli ostacoli nella trasformazione digitale
Superare gli ostacoli nella trasformazione digitale
 
The Tide is Changing: The Importance of Digital for Your Community
The Tide is Changing: The Importance of Digital for Your CommunityThe Tide is Changing: The Importance of Digital for Your Community
The Tide is Changing: The Importance of Digital for Your Community
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital Economy
 
Black Gold's Silver Lining
Black Gold's Silver LiningBlack Gold's Silver Lining
Black Gold's Silver Lining
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Future of IT Podcast: Becoming Cyber Resilient in Today’s Internet of Everything Landscape

  • 1. Becoming Cyber Resilient in Today’s Internet of Everything Landscape #FutureOfIT #Security
  • 2. Jason Brvenik Principal Engineer in Cisco's Security Business Group Future of IT Podcast Featuring: Mike Spanbauer Vice President of Research at NSS Labs
  • 3. “You cannot prevent every attack, whether it's simply due to a rapidly evolving attack surface within your environment or the talents of the adversarial side, the reality is that, these attacks are likely to get through in spite of best efforts.” Source: Mike Spanbauer, Vice President of Research at NSS Labs #FutureOfIT #Security
  • 4. “The easiest thing to do is to ask yourself a simple question: if you knew you were going to be compromised, would you do security differently? And surprisingly, a lot of people haven’t thought about it in this construct.” #FutureOfIT Source: Jason Brvenik , Principal Engineer in Cisco's Security Business Group #Security
  • 5. “In essence, the approach today is generally flawed, you cannot block or detect 100% of everything. It's unrealistic, and the reason being very simple- vulnerability is discovered, and the fact is that the number of apps in the organization, whether that be unique vendors or version of those apps, such as Java engines and so forth, constantly shift.” #FutureOfIT Source: Mike Spanbauer, Vice President of Research at NSS Labs #Security
  • 6. “You realize the problem fundamentally is threats, the community of developers… they're no longer one office or people seeking compromises, they are not criminal organizations in nations and states with a goal. They have compensation structures, they have targets and NBO's and bonuses, and they focus on this. They do this for a living.” #FutureOfIT Source: Jason Brvenik , Principal Engineer in Cisco's Security Business Group #Security
  • 7. “The losses are far greater, and the breaches are increasing at incredible pace, 30% year over year compounded. The fact is, they're growing more frequent.” #FutureOfIT Source: Mike Spanbauer, Vice President of Research at NSS Labs #Security
  • 8. “There are a number of technologies that apply really well here especially in the forensic phase. And that's our protection with its retrospective security, the ability to reach back in time and understand what happened in the light of new information.” #FutureOfIT Source: Jason Brvenik , Principal Engineer in Cisco's Security Business Group #Security
  • 9. Click this button to share this SlideShare.
  • 10. #DigitalTransformation Digital transformation requires companies to think of the Internet as the Internet of Everything. We're ready. Are you? Call us 1-866-428-9594
  • 11. More about the Future of IT: Read Jason Brvenik’s blog: NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security Listen to Future of IT Podcast Subscribe to the Future of IT Podcast Channel via iTunes #FutureOfIT #Security

Editor's Notes

  1. New #FutureOfIT SlideShare: Becoming Cyber Resilient in Today’s #InternetOfEverything Landscape cs.co/ficr @Cisco @NSSLabs http://ctt.ec/b9cr4