47
Juan Marino [email protected] Cuando la prevención no es suficiente Ciberseguridad en La Organización Digital

@Cisco @Cisco_LA Ciberseguridad en la organización digital

Embed Size (px)

Citation preview

Page 1: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Juan Marino

[email protected]

Cuando la prevención no es suficiente

Ciberseguridad en La Organización Digital

Page 2: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Page 3: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Digitalización

Camino

Amenazas

Page 4: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 5: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.

el panorama de amenazas

Page 6: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 7: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 8: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Datakinesis

Page 9: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Page 10: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Page 11: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 12: @Cisco @Cisco_LA Ciberseguridad en la organización digital

vulnerable

Fuera de Soporte

Obsoleto

92%

31%

5%

La confiabilidad genera complacencia

Page 13: @Cisco @Cisco_LA Ciberseguridad en la organización digital

La conciencia erosiona la confianza

59% Confianza en contar con infraestructuraactualizada

51% Confianza en detectar unavulnerabilidad a tiempo

54% Confianza en poderdefenderse frente a un ataque

45% Confianza en poderidentificar y contener un ataque

54% Confianza en poderverificar un ataque

56% Revisa políticas de seguridad de regularmente

-5% 0% -4%

-1% +0% +0%

Page 14: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Nadie puede detener todos los ataques

Page 15: @Cisco @Cisco_LA Ciberseguridad en la organización digital

1. La seguridad debeconsiderarse motor de crecimiento para el negocio

Page 16: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 17: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Atributos de una Arquitectura de Ciberseguridad

Page 18: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Control SimplicidadProtecciónAvanzada

Visibilidad

Seguridad Efectiva y Eficiente

Segmentación Aplicación de PolíticasResiliencia

Page 19: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Seguridad es la prioridad #1 de Cisco

Page 20: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Innovation and Commitment to Being #1 in Security

CLUS: AMP

Data Center

Sourcefire

Acquisition

Closed

Security

for ACI

RSAC: AMP

Everywhere

OpenAppID

2014 ASR

Global

Security Sales

Organization

Neohapsis

Acquired

AMP Everywhere

ThreatGRID

Acquired

Cisco ASA with

FirePOWER

Services

Security

and Trust

Organization

Managed

Threat

Defense

TalosIntegrated

Threat

Defense

2013 2015

Security

Everywhere

OpenDNS

Acquisition

Closed

Page 21: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Prevención

Page 22: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Prevención Retrospección

+

Page 23: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Contextla amenaza depende del contexto

Policyla política reduce la superficie de ataque

Threatfoco en la amenaza, detectar, entender, detener

Breachcomprender impacto, contener y remediar

Page 24: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Breach

Context

Policy

Threat

Scope

Contain

Remediate

Detect

Block

Defend

Control

Enforce

Harden

Discover

Monitor

Inventory

Map

Network / Devices

Users / Applications

Files / Data

BEFORE DURING AFTER

Page 25: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Breach

Context

Policy

Threat

Scope

Contain

Remediate

Detect

Block

Defend

Control

Enforce

Harden

Discover

Monitor

Inventory

Map

Network / Devices

Users / Applications

Files / Data

Control de

Acceso

BEFORE DURING AFTER

De Intrusión De Archivos

Page 26: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Breach

Context

Policy

Threat

Scope

Contain

Remediate

Detect

Block

Defend

Control

Enforce

Harden

Discover

Monitor

Inventory

Map

Network / Devices

Users / Applications

Files / Data

Control de

Acceso

BEFORE DURING AFTER

De Intrusión De Archivos

Page 27: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Breach

Context

Policy

Threat

Scope

Contain

Remediate

Detect

Block

Defend

Control

Enforce

Harden

Discover

Monitor

Inventory

Map

Network / Devices

Users / Applications

Files / Data

Control de

Acceso

BEFORE DURING AFTER

De Intrusión De Archivos

Malo ConocidoConocido /

SospechosoDesconocido

Page 28: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Breach

Context

Policy

Threat

Scope

Contain

Remediate

Detect

Block

Defend

Control

Enforce

Harden

Discover

Monitor

Inventory

Map

Network / Devices

Users / Applications

Files / Data

Control de

Acceso

BEFORE DURING AFTER

De Intrusión De Archivos

Malo ConocidoConocido /

SospechosoDesconocido

Contener DimensionarRemediar

Page 29: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Host-based Security

Wireless

L2//L3 Network

L2//L3 Network

Host-based Security

Identity Posture Assess-ment

CEO sending emailto shareholders

Salesmen accessing customer database

Switch

WAN

Flow Analytics

Access Control +TrustSec

Campus

WirelessIntrusionPrevention

Posture Assess-ment

Access Control +TrustSec

Flow Analytics

Wireless Controller

Identity Mobile Device Mgmt

Page 30: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Host-based Security

Wireless

L2//L3 Network

L2//L3 Network

Host-based Security

Identity Posture Assess-ment

CEO sending emailto shareholders

Salesmen accessing customer database

Switch

WAN

Flow Analytics

Access Control +TrustSec

Campus

WirelessIntrusionPrevention

Posture Assess-ment

Access Control +TrustSec

Flow Analytics

Wireless Controller

Identity Mobile Device Mgmt

Page 31: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Host-based Security

Wireless

L2//L3 Network

L2//L3 Network

Host-based Security

Identity Posture Assess-ment

CEO sending emailto shareholders

Salesmen accessing customer database

Switch

Flow Analytics

Access Control +TrustSec

WirelessIntrusionPrevention

Posture Assess-ment

Access Control +TrustSec

Flow Analytics

Wireless Controller

Identity Mobile Device Mgmt

BEFORE

Page 32: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Host-based Security

Wireless

L2//L3 Network

L2//L3 Network

Host-based Security

Identity Posture Assess-ment

CEO sending emailto shareholders

Salesmen accessing customer database

Switch

Flow Analytics

Access Control +TrustSec

WirelessIntrusionPrevention

Posture Assess-ment

Access Control +TrustSec

Flow Analytics

Wireless Controller

Identity Mobile Device Mgmt

AFTER

Page 33: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Host-based Security

Wireless

L2//L3 Network

L2//L3 Network

Host-based Security

Identity Posture Assess-ment

CEO sending emailto shareholders

Salesmen accessing customer database

Switch

WAN

Flow Analytics

Access Control +TrustSec

Campus

WirelessIntrusionPrevention

Posture Assess-ment

Access Control +TrustSec

Flow Analytics

Wireless Controller

Identity Mobile Device Mgmt

Page 34: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Data Center

L2//L3 Network

Access Control +TrustSec

To Campus

Shared Services

Zone

Next-Gen Intrusion Prevention System

App Server

Zone

PCICompliance

Zone

DatabaseZone

Flow Analytics

Host-based Security

Load Balancer

Flow Analytics

Firewall

Anti-Malware

Threat Intell-igence

Access Control +TrustSec

Next-Gen Intrusion Prevention System

Next-Generation Firewall Router

L2//L3 NetworkFirewall VPN

Switch

Web Application Firewall

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

Logging/Reporting

ThreatIntelligence

VulnerabilityManagement

Monitoring

To Edge

Virtualized Capabilities

WAN

Page 35: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Access

Control +

TrustSec

Next-Gen

Intrusion

Prevention

SystemAnti-

Malware

Threat

Intell-

igence

Access Control +TrustSec

Next-Generation Firewall Router

L2//L3

NetworkFirewall VPN

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

WAN

Page 36: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Access

Control +

TrustSec

Next-Gen

Intrusion

Prevention

SystemAnti-

Malware

Threat

Intell-

igence

Access Control +TrustSec

Next-Generation Firewall Router

L2//L3

NetworkFirewall VPN

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

WAN

Page 37: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Access

Control +

TrustSec

Next-Gen

Intrusion

Prevention

SystemAnti-

Malware

Threat

Intell-

igence

Access Control +TrustSec

Next-Generation Firewall Router

L2//L3

NetworkFirewall VPN

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

WAN

Page 38: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Data Center

L2//L3 Network

Access Control +TrustSec

To Campus

Shared Services

Zone

Next-Gen Intrusion Prevention System

App Server

Zone

PCICompliance

Zone

DatabaseZone

Flow Analytics

Host-based Security

Load Balancer

Flow Analytics

Firewall

Anti-Malware

Threat Intell-igence

Access Control +TrustSec

Next-Gen Intrusion Prevention System

Next-Generation Firewall Router

L2//L3 NetworkFirewall VPN

Switch

Web Application Firewall

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

Logging/Reporting

ThreatIntelligence

VulnerabilityManagement

Monitoring

To Edge

Virtualized Capabilities

WAN

BEFORE

Page 39: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Data Center

L2//L3 Network

Access Control +TrustSec

To Campus

Shared Services

Zone

Next-Gen Intrusion Prevention System

App Server

Zone

PCICompliance

Zone

DatabaseZone

Flow Analytics

Host-based Security

Load Balancer

Flow Analytics

Firewall

Anti-Malware

Threat Intell-igence

Access Control +TrustSec

Next-Gen Intrusion Prevention System

Next-Generation Firewall Router

L2//L3 NetworkFirewall VPN

Switch

Web Application Firewall

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

Logging/Reporting

ThreatIntelligence

VulnerabilityManagement

Monitoring

To Edge

Virtualized Capabilities

WAN

DURING

Page 40: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Data Center

L2//L3 Network

Access Control +TrustSec

To Campus

Shared Services

Zone

Next-Gen Intrusion Prevention System

App Server

Zone

PCICompliance

Zone

DatabaseZone

Flow Analytics

Host-based Security

Load Balancer

Flow Analytics

Firewall

Anti-Malware

Threat Intell-igence

Access Control +TrustSec

Next-Gen Intrusion Prevention System

Next-Generation Firewall Router

L2//L3 NetworkFirewall VPN

Switch

Web Application Firewall

Centralized Management

Policy/Configuration

Visibility/Context

AnalysisCorrelation

Analytics

Logging/Reporting

ThreatIntelligence

VulnerabilityManagement

Monitoring

To Edge

Virtualized Capabilities

WAN

AFTER

Page 41: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 42: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 43© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Page 43: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 44: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Security Services Portfolio

Optimization

Migration

Plan,

Design,

Implement

Program Strategy

Architecture & Design

Assessments

Managed Security

(SOC)

Managed

Services

Advisory Integration

Page 45: @Cisco @Cisco_LA Ciberseguridad en la organización digital

Cisco Confidential 47© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Digitalización

Camino

Page 46: @Cisco @Cisco_LA Ciberseguridad en la organización digital
Page 47: @Cisco @Cisco_LA Ciberseguridad en la organización digital