I forkant av svindleren

Size: px
Start display at page:

Download "I forkant av svindleren"

Transcription

1 I forkant av svindleren -med teknologien på din side Christian Nordve Systems Engineer 2014 Cisco and/or its affiliates. All rights reserved. Cisco 1

2 The Security Problem Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation 2014 Cisco and/or its affiliates. All rights reserved. 2

3 Breach Statistics 60% of data is stolen in hours 54% of breaches remain undiscovered for months 100% of companies connect to domains that host malicious files or services It is a Community that hides in plain sight avoids detection and attacks swiftly 2014 Cisco and/or its affiliates. All rights reserved. 3

4 There are two types of companies: Those who have been hacked, and those who don t yet know they have been hacked. John Chambers Chief Executive Officers of Cisco 2014 Cisco and/or its affiliates. All rights reserved. 4

5 Hvorfor? 2014 Cisco and/or its affiliates. All rights reserved. 5

6 Why? 2014 Cisco and/or its affiliates. All rights reserved. 6

7 Ville du gjort noe annerledes i dag om du viste at du kom til å bli angrepet i mogen? 2014 Cisco and/or its affiliates. All rights reserved. 7

8 Når bygde Noha arken? Før det begynte å regne! 2014 Cisco and/or its affiliates. All rights reserved. 8

9 En endring i vår forståelse og innstilling er i ferd med å endres Cisco and/or its affiliates. All rights reserved. Cisco 9

10 A Threat-Centric Security Model is Needed Shared Context & Security Intelligence Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Cloud Visibility-Driven & Threat-Focused 2014 Cisco and/or its affiliates. All rights reserved. 10

11 Building a Threat-Centric Cisco Security Architecture BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Attack Continuum Cisco and/or its affiliates. All rights reserved. Cisco 11

12 2014 Cisco and/or its affiliates. All rights reserved. 12

13 Se og forstå det sammensatte bilde! 2014 Cisco and/or its affiliates. All rights reserved. 13

14 Evne til å se ting i perspektiv og retroperspektiv Hvis noe kommer seg inn på nettet hos oss eller på en av våre maskiner forde vi ikke vet om det er farlig...fordi det er helt nytt og ingen har sette det før. Men, i morgen så vet vi mer og kan nå slå fast at det er et virus... Ville ikke du da helst vite om det? - Hvem lastet det? - Hvor er det nå? Hvor har det spredd seg 2014 Cisco and/or its affiliates. All rights reserved. 14

15 Nettverket ser alt NetFlow Files Users Web Applications Application Protocols Services Malware Command and Control Servers Vulnerabilities Processes Network Servers Operating Systems Routers and Switches Mobile Devices Printers VoIP Phones Virtual Machines Client Applications Network Behavior 2014 Cisco and/or its affiliates. All rights reserved. 15

16 Vi må integrere mer effektivt for å skape en virkningsfull sikkerhetsløsning Cisco and/or its affiliates. All rights reserved. 16

17 Det krever arkitektur Cisco and/or its affiliates. All rights reserved. Cisco 17

18 Utfordringer Ikke noe av dette virker hvis alt må være på plass for at noe skal virke Hver enkel løsning/produkt må kunne stå på egene ben og være blandt de beste, hver for seg Når Cisco løsningen settes sammen vil de skape mulighet for å bruke hverandres innsikt og innsyn til å berike hverandre Our fundamental job is to reduce complexity and increase capability 2014 Cisco and/or its affiliates. All rights reserved

19 Superior Intelligence to battle Advanced Threats Cisco SIO I00I III0I III00II 0II00II I0I I000 0II0 00 0III000 II Talos III000III0 I00I II0I III Cisco Collective Security Intelligence Sourcefire VRT III0 I00I II0I III00II 0II00II II0 00 0III000 III0I00II II II0000I II0 100I II0I III00II 0II00II I0I000 0II ,000+ File Samples per Day FireAMP Community, 3+ million 1.8 million global sensors 35% worldwide traffic Advanced Microsoft and Industry Disclosures 100 TB of data received per day 180 million+ deployed endpoints 600+ engineers, technicians, and researchers 13 billion web requests 24x7x365 operations 40+ languages WWW AMP Web Network NGIPS NGFW Pervasive across Portfolio Snort and ClamAV Open Source Communities Honeypots Sourcefire AEGIS Program Private and Public Threat Feeds Dynamic Analysis 2014 Cisco and/or its affiliates. All rights reserved. 19

20 Oppsummert Collective Security Intelligence Covers the entire Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Strategic Imperatives Visibility-Driven Threat-Focused Platform-Based Network-Integrated, Broad Sensor Base, Context sharing and Automation Continuous Advanced Threat Protection, Cloud-Based Security Intelligence Leading products working together as a system Built for Scale, Consistent Control, Management 2014 Cisco and/or its affiliates. All rights reserved. 20

21 Takk for meg! Cisco and/or its affiliates. All rights reserved. Cisco 21

Napredna Cisco sigurnosna rješenja

Napredna Cisco sigurnosna rješenja Napredna Cisco sigurnosna rješenja Dragan Novaković, Security Consulting Systems Engineer 10.3.2016. 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 The Security Problem Changing

More information

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015 #TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security

More information

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016 Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious

More information

Understanding Cisco s Security Focus And Its Integrated Architectural Approach

Understanding Cisco s Security Focus And Its Integrated Architectural Approach Understanding Cisco s Security Focus And Its Integrated Architectural Approach John McCurdy Vice President, Americas, Global Security Sales Organization (GSSO) June 2016 A Familiar View Another Point Of

More information

Cisco Cybersecurity Pocket Guide 2015

Cisco Cybersecurity Pocket Guide 2015 Cisco Cybersecurity Pocket Guide 2015 Why Security Security investment: A top priority Security: A critical boardroom topic Why Security? Security Investment: A Top Priority Figure 1 How Enterprises View

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

Deploying Next Generation Firewall with ASA and Firepower services

Deploying Next Generation Firewall with ASA and Firepower services Deploying Next Generation Firewall with ASA and Firepower services Dragan Novaković Security Consulting Systems Engineer March 2015. Threat Landscape Demands more than Application Control 60% of data is

More information

Agile Cyber Security Security for the Real World, Architectural Approach

Agile Cyber Security Security for the Real World, Architectural Approach Agile Cyber Security Security for the Real World, Architectural Approach Osama Al-Zoubi Senior Manger, Systems Engineering Fahad Aljutaily Senior Solution Architect, Security Market Trends Welcome to the

More information

Making sense out of the Security Operations

Making sense out of the Security Operations Gaweł Mikołajczyk gmikolaj@cisco.com Making sense out of the Security Operations Cisco Public 1 CONFidence 2012 https://www.youtube.com/watch?v=ebi1xlmg5xe Cisco Public 2 CONFidence 2016 Network Security

More information

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015 Cisco Security Strategy Update Integrated Threat Defense Oct 28, 2015 Breaches are the New Normal FDA Wards of Security Flaw in Infusion Pump Cisco Confidential Cisco s Covers the Threat-Centric Entire

More information

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We

More information

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks

More information

Cisco Web Security: Protection, Control, and Value

Cisco Web Security: Protection, Control, and Value Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security

More information

Thomas Ludvik Næss Country Manager

Thomas Ludvik Næss Country Manager Thomas Ludvik Næss Country Manager For hvert 2.5 sekund slippes det en ny malware! Hvor mange Bic Mac spiser du?! Source: blog.trendmicro.com Virus Remover 2008 & Antivirus 2009 Source: blog.trendmicro.com

More information

Cisco Email Security: Layered Protection from Blended Threats

Cisco Email Security: Layered Protection from Blended Threats Cisco Email Security: Layered Protection from Blended Threats Benefits Faster, more comprehensive email protection, often hours or days ahead of the competition The largest network of threat intelligence

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges

More information

Content Security: Protect Your Network with Five Must-Haves

Content Security: Protect Your Network with Five Must-Haves White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as

More information

Nordic Master in Didactics of Mathematics

Nordic Master in Didactics of Mathematics Nordic Master in Didactics of Mathematics NORDIMA Barbro Grevholm Seminar i Bergen den 7-8 september 2011 Nordic Master in Didactics of Mathematics Project number NMP-2009/10730 The Master Consortium consists

More information

Why Use Big Data for a Security Service?

Why Use Big Data for a Security Service? Using Big Data for Good Advanced Malware Protection as a Cloud Service Gary Spiteri Security Engineer 17 July 2012 Why Use Big Data for a Security Service? Because the traditional way is broken Industry

More information

Intelligent Cybersecurity for the Real World. Cisco Cybersecurity Pocket Guide

Intelligent Cybersecurity for the Real World. Cisco Cybersecurity Pocket Guide Intelligent Cybersecurity for the Real World Cisco Cybersecurity Pocket Guide EMEA 2015 Content What an Opportunity! Security Investment is a Top Priority Why Cisco? Cisco is the Leading Security Company

More information

Comstor Security Initiative. Comstor Security Initiative

Comstor Security Initiative. Comstor Security Initiative Comstor Comstor Work in partnership with Comstor and Cisco to unlock the potential of Cyber security Cyber security is projected to be a $170 billion market by 2020. There are 10 billion connected sensors

More information

Ny postlov i Norge New postal regulations in Norway. Frode Wold, Norway Post Nordic Address Forum, Iceland 5-6. may 2015

Ny postlov i Norge New postal regulations in Norway. Frode Wold, Norway Post Nordic Address Forum, Iceland 5-6. may 2015 Frode Wold, Norway Post Nordic Address Forum, Iceland 5-6. may 2015 < Norge skal innordne seg EU s postdirektiv og dette vil få konsekvenser for Posten Norge mht postnummeradministrasjon, postadresser

More information

Claus B. Jensen IT Auditor, CISA, CIA

Claus B. Jensen IT Auditor, CISA, CIA Claus B. Jensen IT Auditor, CISA, CIA I am employed in Rigsrevisionen, Denmark. (Danish National Audit Office) I have worked within IT Audit since 1995, both as internal and external auditor and now in

More information

Revolusjonen COPYRIGHT NOTICE

Revolusjonen COPYRIGHT NOTICE Revolusjonen COPYRIGHT NOTICE The creative work in this presentation is protected by copyright. Redistribution or commercial use 2003: Facemash Dating? 2004: THEFACEBOOK.COM 2004: Facebook.com 25/8-2011:736

More information

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR The IndustrializaBon of Hacking SophisEcated AFacks, Complex Landscape Hacking Becomes an Industry Phishing, Low

More information

Protection Against Advanced Persistent Threats

Protection Against Advanced Persistent Threats Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are

More information

Maximizing customer protections

Maximizing customer protections Maximizing customer protections 8 7 Vista XP XP end of support 8 XP 7 Vista XP What is the risk of continuing to run XP? Attackers will have the advantage over defenders After support ends, when Microsoft

More information

Cisco ASA und FirePOWER Services

Cisco ASA und FirePOWER Services Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle

More information

A small selection of emails we have chosen to include to show some of our communication with the open source community and how this has proceeded.

A small selection of emails we have chosen to include to show some of our communication with the open source community and how this has proceeded. Chapter 1 Various emails A small selection of emails we have chosen to include to show some of our communication with the open source community and how this has proceeded. 1.1 Communication with a teachers

More information

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO 2014 Cisco and/or and/or its affiliates. its affiliates. All rights All reserved.

More information

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line

More information

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

1) Testing of general knowledge 25%. Each right question counts 1. Each wrong counts 0.5. Empty

1) Testing of general knowledge 25%. Each right question counts 1. Each wrong counts 0.5. Empty The exam consists of four parts: 1) Testing of general knowledge 25%. Each right question counts 1. Each wrong counts 0.5. Empty counts zero. See the note in the end of this document. 2) Planning 20%.

More information

1) Testing of general knowledge 25%. Each right question counts 1. Each wrong counts 0.5. Empty

1) Testing of general knowledge 25%. Each right question counts 1. Each wrong counts 0.5. Empty 1 Exam 2 The exam consists of four parts: 1) Testing of general knowledge 25%. Each right question counts 1. Each wrong counts 0.5. Empty counts zero. See below note about Task 1. 2) Planning 20%. All

More information

Innovation In Network Security

Innovation In Network Security SESSION ID: BAS-M03 Innovation In Network Michael Geller Principal Engineer Cisco Systems, Inc. @michaelge11er Innovation In Network Is Visibility & Control The application of people, process and tools

More information

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Five Steps For Securing The Data Center: Why Traditional Security May Not Work White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center

More information

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Five Steps For Securing The Data Center: Why Traditional Security May Not Work White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center

More information

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,

More information

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1 C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing

More information

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,

More information

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire Expert Reference Series of White Papers Cisco Completes the Security Picture with Sourcefire info@globalknowledge.net www.globalknowledge.net Cisco Completes the Security Picture with Sourcefire Rich Hummel,

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

Security in Transportation: Preparing Defenses for a New Connected Era

Security in Transportation: Preparing Defenses for a New Connected Era White Paper Security in Transportation: Preparing Defenses for a New Connected Era Transportation is a complex ecosystem that is part of the critical infrastructure of any city, state, or nation. Any disruption

More information

Kvalifisering av ny teknologi

Kvalifisering av ny teknologi Kvalifisering av ny teknologi Siemens AS 26.05.2011 Siemens Oil & Gas solutions - Offshore 2010. All rights reserved. De tre viktigste tingene subsea: Pålitelighet Pålitelighet Pålitelighet Hvorfor kvalifisering?

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Integrated Network Security Architecture: Threat-focused Nextgeneration

Integrated Network Security Architecture: Threat-focused Nextgeneration White Paper Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by Cisco Systems

More information

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past

More information

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015 Threat-Centric Security Solutions György Ács Security Consulting Systems Engineer 3 rd November 2015 The Problem is Threats About Angler Exploit Kit http://www.networkworld.com/article/2989827/security/cisco-disrupts-60m-ransomware-biz.html

More information

Hot & New in Symantec Management and Windows Protection

Hot & New in Symantec Management and Windows Protection [Technology Days 2010] Hot & New in Symantec and Windows Protection Finn Henningsen & Wael Al Assadi Hot & New in Symantec and Windows Protection AGENDA 1 2 3 Intro Storage /Wael Al Assadi Assadi Endpoint

More information

Hvis personallisten ikke er ført slik reglene sier, kan Skatteetaten ilegge overtredelsesgebyr.

Hvis personallisten ikke er ført slik reglene sier, kan Skatteetaten ilegge overtredelsesgebyr. Denne boken er utgitt av Skatteetaten og sendes gratis til alle som er pålagt å føre personalliste fra 1. januar 2014. Det vil si bransjene servering, frisør, skjønnhetspleie, bilpleie og bilverksted.

More information

Cisco Security Experts Series: Ransom Where Everywhere: Breaking Down the Ransomware

Cisco Security Experts Series: Ransom Where Everywhere: Breaking Down the Ransomware Cisco Security Experts Series: Ransom Where Everywhere: Breaking Down the Ransomware Andrew Edwards / Rob Gregg Cyber Security @ Cisco July 6th, 2016 Better Security Visibility Securing the Mobile Enterprise

More information

2011 Cyber Defence: Detect, Correct, Prevent. Paranoia 2011 November 10th

2011 Cyber Defence: Detect, Correct, Prevent. Paranoia 2011 November 10th 2011 Cyber Defence: Detect, Correct, Prevent Paranoia 2011 November 10th WATCHCOM Managed Services Bjørn R. Watne Chief Operations Officer bjorn.watne@watchcom.no Watchcom Security Group AS WATCHCOM SOC

More information

Luka Markota. Enterprise Networking, Central Europe. April 2015

Luka Markota. Enterprise Networking, Central Europe. April 2015 Luka Markota Enterprise Networking, Central Europe April 2015 The Customer Journey Can you make the leap? Today Digitisation IoT/IoE 2015 000100101011010101001001001001000101 101001010011100100101010001001001010

More information

Intelligent Cybersecurity for the Real World

Intelligent Cybersecurity for the Real World Intelligent Cybersecurity for the Real World Ali Fuat TÜRKAY aturkay@cisco.com 0 532 677 4080 Ali Fuat Türkay: Security Sales Fuat Kılıç: Consulting System Engineer Hakan Tağmaç: Emerging Markets SE Manager

More information

FaSMEd meeting, 24.02.15 Maria I.M. Febri

FaSMEd meeting, 24.02.15 Maria I.M. Febri FaSMEd meeting, 24.02.15 Maria I.M. Febri Hverdagsforestillinger (Every day concepts) Begrepet Hverdagsforestillinger Elever kommer til naturfagundervisning med diverse forestillinger basert på / bygd

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Cisco ASA with FirePOWER Services. October 2014

Cisco ASA with FirePOWER Services. October 2014 Cisco ASA with FirePOWER Services October 2014 What We Are Announcing September 16, 2014 Industry s First Threat-Focused NGFW Proven Cisco ASA firewalling + Industry leading NGIPS and AMP Cisco ASA with

More information

Jakten på Skapergleden Hvordan bevare mennesket i loopen?

Jakten på Skapergleden Hvordan bevare mennesket i loopen? Jakten på Skapergleden Hvordan bevare mennesket i loopen? Thor Hukkelås, M.Sc. Principal Engineer Marine Operations Business Development, Kongsberg Maritime AS Jakten på skapergleden K Master SITUMAR Gleden

More information

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security White Paper Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security Overview For collaboration, communication, and data access, the web has become a mission-critical business tool. But

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

The modal verbs kan sende modtage Same word for must and may Future expressed without modal verb

The modal verbs kan sende modtage Same word for must and may Future expressed without modal verb The modal verbs A modal verb can, may must, shall or will is an auxiliary it modifies the verb and expresses whether the action described is seen as plan, intention, necessity, possibility, prediction,

More information

Cisco & Big Data Security

Cisco & Big Data Security Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that

More information

Windows Server 2008 R2

Windows Server 2008 R2 Windows Server 2008 R2 Olav Tvedt olav@tvedt.info TVEDT.info 10/2/2009 1 Agenda Direct Acces Remote Desktop Services Group Policyer 10/2/2009 2 Direct Access Teknologier i bruk IPv6 Isatap 6To4 Teredo

More information

Securing Your Business with DNS Servers That Protect Themselves

Securing Your Business with DNS Servers That Protect Themselves Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to legitimate

More information

Data Center Security That Accelerates Your Business

Data Center Security That Accelerates Your Business Solution Overview Data Center Security That Accelerates Your Business Business today runs at a breakneck pace. Customers want exceptional service, and workers expect instant access to their job tools,

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

Cisco Customer Education Hackers, Botnets and Malware - Oh My! Battle 21st Century Threats with Cisco Next-Gen Security

Cisco Customer Education Hackers, Botnets and Malware - Oh My! Battle 21st Century Threats with Cisco Next-Gen Security Cisco Customer Education Hackers, Botnets and Malware - Oh My! Battle 21st Century Threats with Cisco Next-Gen Security This session was recorded via Cisco WebEx! You can watch the live session recording

More information

REV: 0.1.1 (July 2011) McAfee Security: Intrusion Prevention System

REV: 0.1.1 (July 2011) McAfee Security: Intrusion Prevention System McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Buyer s Criteria for Advanced Malware Protection

Buyer s Criteria for Advanced Malware Protection White Paper Buyer s Criteria for Advanced Malware Protection What You Will Learn This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key

More information

Detect, Prevent and Remediate the Cyber attack Nelson Yuen

Detect, Prevent and Remediate the Cyber attack Nelson Yuen Detect, Prevent and Remediate the Cyber attack Nelson Yuen Senior Systems Engineer Overview of the Local Security Landscape IP camera footages broadcasted live online In September, 2014, more than 1,000

More information

Software Engineering. A Short Overview. Hans- Petter Halvorsen, M.Sc.

Software Engineering. A Short Overview. Hans- Petter Halvorsen, M.Sc. Software Engineering A Short Overview Hans- Petter Halvorsen, M.Sc. The beginning... IBM HP 1911 1939 The Transistor 1947 Moore s Law 1965 The first Computer???? The Turing machine (Alan Turing, 1936)?

More information

Healthcare Security: Improving Network Defenses While Serving Patients

Healthcare Security: Improving Network Defenses While Serving Patients White Paper Healthcare Security: Improving Network Defenses While Serving Patients What You Will Learn Safeguarding the privacy of patient information is critical for healthcare providers. However, Cisco

More information

How Shared Security Intelligence Can Better Stop Targeted Attacks

How Shared Security Intelligence Can Better Stop Targeted Attacks How Shared Security Intelligence Can Better Stop Targeted Attacks SESSION ID: SPO3-T07 Piero DePaoli Senior Director Global Product Marketing Symantec Corporation Targeted Attacks are an Increasing Issue

More information

08.06.2012 10:06 QuestBack eksport - MMS video survey 2012

08.06.2012 10:06 QuestBack eksport - MMS video survey 2012 MMS video survey 2012 Publisert fra 21.05.2012 til 14.09.2012 119 respondenter (1 unike) 1. Who are you 1 Student 95,8 % 114 2 Lecturer 4,2 % 5 Total 119 1 2. Have you received sufficient information about

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

Threat Prevention with AMP (Advanced Malware Protection) Gary Spiteri Cisco Systems

Threat Prevention with AMP (Advanced Malware Protection) Gary Spiteri Cisco Systems Threat Prevention with AMP (Advanced Malware Protection) Gary Spiteri gaspiter@cisco.com Cisco Systems 1 Agenda The Malware Analysis Challenge Endpoint Malware Analysis Network Malware Analysis Host and

More information

Presentation. Morten Hvenegaard Project Sales

Presentation. Morten Hvenegaard Project Sales Presentation One sensor in each luminaire - efficient lighting control 25 % savings on seamless daylight adjustment. One sensor in each luminaire - efficient lighting control 25 % savings on seamless daylight

More information

Delivering Control with Context Across the Extended Network

Delivering Control with Context Across the Extended Network Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or

More information

Software Defined Networking

Software Defined Networking Cisco Partner Day 2015 Software Defined Networking Hva Hvor Hvordan www.cisco.com/go/sdnfordummies Merete s story Cisco Partner Day 2015 Cisco Partner Day 2015 "når mennesker er innvolvert går ting til

More information

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland 2 Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective,

More information

Quick Start Guide. Quick Start Guide

Quick Start Guide. Quick Start Guide Quick Start Guide Quick Start Guide Box contents Indhold i æsken 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 1. Gigaset C610 IP-base 2. Strømadapter til at koble basen til strømmen 3. Telefonkabel til at koble

More information

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Innovative Security for an Accelerating World New Approaches for Chief Security Officers Information Systems Security Association Innovative Security for an Accelerating World New Approaches for Chief Security Officers John N. Stewart Senior Vice President Chief Security and Trust Officer

More information

XenDesktop Workshop. Hva, Hvordan.? The best desktop virtualization solution is now even better

XenDesktop Workshop. Hva, Hvordan.? The best desktop virtualization solution is now even better powered by XenDesktop Workshop. Hva, Hvordan.? The best desktop virtualization solution is now even better Stian A. Petersen Løsnings Arkitekt Stian@commaxx.no Commaxx Denne workshop er basert på følgende:

More information

United Kingdom: Prioritising Security at Management and Board Levels

United Kingdom: Prioritising Security at Management and Board Levels White Paper United Kingdom: Prioritising Security at Management and Board Levels The UK government is investing significant resources to help make the country a safe place to do business online. Achieving

More information

Hvordan kunders informasjonsbehov er endret og hvordan bedrifter kan tilpasse seg denne endringen. Steinar Heggemsnes HP Exstream

Hvordan kunders informasjonsbehov er endret og hvordan bedrifter kan tilpasse seg denne endringen. Steinar Heggemsnes HP Exstream Hvordan kunders informasjonsbehov er endret og hvordan bedrifter kan tilpasse seg denne endringen. Steinar Heggemsnes HP Exstream Kommunikasjon i går og i dag Agenda: Kommunikasjon i går og i dag Hvordan

More information

Protecting the un-protectable Addressing Virtualisation Security Challenges

Protecting the un-protectable Addressing Virtualisation Security Challenges Protecting the un-protectable Addressing Virtualisation Security Challenges Paul Hogan, Technical Director, Ward Solutions November 11, 2010 Top Cloud Security Challenges Secure Virtualisation Need secure

More information

Hvordan påvirker Cloud dine integrasjonsbehov?

Hvordan påvirker Cloud dine integrasjonsbehov? Hvordan påvirker Cloud dine integrasjonsbehov? Rune Nygård, Oracle 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8

More information

Cisco Cloud Web Security

Cisco Cloud Web Security Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that

More information

DEFINITE AND INDEFINITE FORM

DEFINITE AND INDEFINITE FORM DEFINITE AND INDEFINITE FORM In Norwegian, a noun can appear either in the indefinite form or in the definite form. There are some absolute rules that determine which form is correct, but three important

More information

Cisco Cloud Security Accelerates Cloud Adoption

Cisco Cloud Security Accelerates Cloud Adoption White Paper Cisco Cloud Security Accelerates Cloud Adoption Introduction Cloud computing is gaining customer attention at a fascinating pace. An Infonetics research report published in early 2011 noted

More information

VHDL programmering H2

VHDL programmering H2 VHDL programmering H2 VHDL (Very high speed Integrated circuits) Hardware Description Language IEEE standard 1076-1993 Den benytter vi!! Hvornår blev den frigivet som standard første gang?? Ca. 1980!!

More information

Securing Your Business with DNS Servers That Protect Themselves

Securing Your Business with DNS Servers That Protect Themselves Product Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to

More information