14
Intelligent Cybersecurity for the Real World Francisco Ramirez Ghassan Dreibi Nov 5, 2014

Cisco Live Cancun PR Session

Embed Size (px)

DESCRIPTION

Cisco Live Cancun, Security press conference

Citation preview

Page 1: Cisco Live Cancun PR Session

Intelligent Cybersecurity for the Real World

Francisco Ramirez Ghassan Dreibi

Nov 5, 2014

Page 2: Cisco Live Cancun PR Session

Cisco Confidential 2 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Session 1

Francisco Ramirez – Security Managing Director

Ghassan Dreibi – Strategic & Planning BDM

Session 2 Carlo Davila – IDC LATAM Analyst

Agenda

Page 3: Cisco Live Cancun PR Session

Cisco Confidential 3 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

The Industrialization of Hacking

2000 1990 1995 2005 2010 2015 2020 Viruses 1990–2000

Worms 2000–2005

Spyware and Rootkits 2005–Today

APTs Cyberware Today +

Hacking Becomes an Industry

Sophisticated Attacks, Complex Landscape

Phishing, Low Sophistication

Page 4: Cisco Live Cancun PR Session

Cisco Confidential 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Threat Landscape Demands more than Application Control

100% of companies connect to domains that host

malicious files or services

54% of breaches

remain undiscovered for months

60% of data is stolen in hours

avoids detection and attacks swiftly

It is a Community that hides in plain sight

Page 5: Cisco Live Cancun PR Session

Cisco Confidential 5 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

The Pervasiveness of Malicious Traffic

High-Threat Malware

Hijacked Infrastructure

Sites without Content

Suspect FTP

Suspect VPN

Inappropriate Content

100%

96%

92%

88%

79%

50%

Page 6: Cisco Live Cancun PR Session

Cisco Confidential 6 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

The Silver Bullet Does Not Exist

“Captive portal”

“It matches the pattern”

“No false positives, no false negatives”

Application Control

FW/VPN

IDS/IPS UTM

NAC

AV PKI

“Block or Allow”

“Fix the Firewall”

“No key, no access”

Sandboxing

“Detect the Unknown”

GSSO focuses on the totality of defending against threats

Page 7: Cisco Live Cancun PR Session

Cisco Confidential 7 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

GSSO – Global Security Sales Organization A New Way to Solve Real World Security Issues

Dedicated Security sales force – GSSO

Aligned with Cisco’s Services, Partner and Sales Organization (Cisco) +

Selling market leading technology, services and solutions across the entire attack continuum

+

Unmatched differentiation Market credibility that will amplify loyalty Stronger solutions across all architectures

=

Cisco Confidential 7 ©2014 Cisco and/or its affiliates. All rights reserved.

Page 8: Cisco Live Cancun PR Session

Cisco Confidential 8 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Visibility: See More – Protect More

Network Servers

Operating Systems

Routers and Switches

Mobile Devices

Printers

VoIP Phones

Virtual Machines

Client Applications

Files

Users

Web Applications

Application Protocols

Services

Malware

Command and Control

Servers

Vulnerabilities

NetFlow

Network Behavior

Processes

Page 9: Cisco Live Cancun PR Session

Cisco Confidential 9 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cyber Security Advanced Model

BEFORE Discover Enforce Harden

AFTER Scope Contain

Remediate

Attack Continuum

Detect Block

Defend

DURING

Network Endpoint Mobile Virtual Cloud

Point in Time Continuous

Page 10: Cisco Live Cancun PR Session

Cisco Confidential 10 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Serv

ices Cyber Threat Defense

Manage Security CPE

Solution Implementation

Security Assessment

Strategic Planning

Solution Plan / Design

Managed Threat Defense

Custom Threat Intelligence

Security Optimization

Firewall

NGFW

NAC + Identity Services

VPN

UTM

NGIPS

Web Security

Advanced Malware Protection

Network Behavior Analysis

Prod

ucts

Email Security

Cyber Security Attach Continuum Approach

BEFORE Discover Enforce Harden

AFTER Scope Contain

Remediate

Detect Block

Defend

DURING

Page 11: Cisco Live Cancun PR Session

Cisco Confidential 11 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Strategic Imperatives

Visibility-Driven Threat-Focused Platform-Based

Network Endpoint Mobile Virtual Cloud

Page 12: Cisco Live Cancun PR Session

Cisco Confidential 12 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cloud Connected Network

Mobile Router Firewall

The Distributed Perimeter

The Security Perimeter in the Cloud

Collective Security Intelligence

Telemetry Data Threat Research Advanced Analytics

3M+ Cloud Web Security Users

6GB Web Traffic Examined, Protected Every Hour

75M Unique Hits Every Hour

10M Blocks Enforced Every Hour

Page 13: Cisco Live Cancun PR Session

Cisco Confidential 13 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Platform-Based Security Architecture

Management

Security Services and Applications

Security Services Platform

Infrastructure Element Layer

Common Security Policy & Management

Common Security Policy and Management

Orchestration

Security Management APIs

Cisco ONE APIs

Platform APIs

Cloud Intelligence APIs

Physical Appliance Virtual Cloud

Access Control

Context Awareness

Content Inspection

Application Visibility

Threat Prevention

Device API: OnePK™, OpenFlow, CLI

Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider)

Route–Switch–Compute ASIC Data Plane Software Data Plane

APIs APIs

Cisco Security Applications Third-Party Security Applications

Page 14: Cisco Live Cancun PR Session

Thank you.