Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Similar documents
The Internet of Things:

Braindumps QA

Requirements When Considering a Next- Generation Firewall

Threat-Centric Security for Service Providers

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

SourceFireNext-Generation IPS

One Minute in Cyber Security

Cisco & Big Data Security

Cisco Advanced Malware Protection

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Obtaining Enterprise Cybersituational

Security Analytics for Smart Grid

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Information Security for the Rest of Us

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Cisco Remote Management Services for Security

Content Security: Protect Your Network with Five Must-Haves

Next Generation IPS and Reputation Services

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cisco Security Intelligence Operations

State of Security Monitoring of Public Cloud

Unlocking the Intelligence in. Big Data. Ron Kasabian General Manager Big Data Solutions Intel Corporation

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

The Internet of Things (IoT) Opportunities and Risks

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Integrating a Big Data Platform into Government:

End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

How To Create An Insight Analysis For Cyber Security

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Software that provides secure access to technology, everywhere.

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Analyzing HTTP/HTTPS Traffic Logs

The Internet of Everything

Evolution Of Cyber Threats & Defense Approaches

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Zak Khan Director, Advanced Cyber Defence

Cisco Cyber Threat Defense - Visibility and Network Prevention

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

The Necessity Of Cloud- Delivered Integrated Security Platforms

Connected Intelligence and the 21 st Century Digital Enterprise

Cisco Cybersecurity Pocket Guide 2015

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Unified Security, ATP and more

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Cisco Small Business ISA500 Series Integrated Security Appliances

A Primer on Cyber Threat Intelligence

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Modern Approach to Incident Response: Automated Response Architecture

Integrated Network Security Architecture: Threat-focused Nextgeneration

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

I D C A N A L Y S T C O N N E C T I O N

On and off premises technologies Which is best for you?

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Cisco Master Security Specialization Practice Areas Summary. February 2016

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Detect & Investigate Threats. OVERVIEW

Cisco Master Security Specialization Practice Areas Summary. June 2015

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

End-user Security Analytics Strengthens Protection with ArcSight

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

The Big Data Paradigm Shift. Insight Through Automation

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

How To Manage A Network Security Risk

This Symposium brought to you by

Palo Alto Networks. October 6

Comprehensive real-time protection against Advanced Threats and data theft

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

The Next Generation Data Centers: SPECS and The 3 rd Platform.

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

Transcription:

Information Systems Security Association Innovative Security for an Accelerating World New Approaches for Chief Security Officers John N. Stewart Senior Vice President Chief Security and Trust Officer Cisco April 19, 2015

Cyber is Crime Corporate espionage National espionage Disruption Destruction Terrorism Protest

Gaps Between Perception & Reality of Threats Attackers Are Expanding Tactics Snowshoe spam, Web Exploit kits & combinations of JavaScript and Flash malware Users Unknowingly Aid Attacks 280% spike in Silverlight Attacks; 250% spike in spam & malvertising exploits Infections Are the New Normal 100% of networks analyzed have traffic going to sites hosting malware Source: 2015 Cisco Annual Security Report

Internet of Everything 39 % of the world s population is connected 13B connected things Technology powers 80 % of business processes More data in one year than in previous 5000

CONNECTED THINGS

Exponential Connections = Exponential Security Challenges Traditional Security Challenges Smart Objects Increased attack surface Talent shortage Many IT Security vendors per company (average = 65) IT teams don t understand how it all fits together 6 130 Devices per Person Sensors per Person

You Need Platform-Based Security

Platform-Based Security Solutions Start with Visibility and Control Superior Visibility Granular Control Advanced Threat Protection Actionable Intelligence Automated Decisions Advanced video analytics, remote management, and multisite event correlation Differentiated policy enforcement across the extended network Comprehensive cyber security threat detection and mitigation Internetworked security solutions for superior intelligence and rapid response Machine-to-machine enabled security control with no human intervention required

Platform-Based Security Solutions to Reduce Complexity and Increase Capability Collective Security Intelligence Centralized Management Appliances, Virtual Network/DC Control Platform Device Control Platform Cloud Services Control Platform Appliances, Virtual Host, Mobile, Virtual Hosted

Strong Analytics Drive Actionable Security Decision Making

IoT Creates Data at Scale Never Seen Before A large refinery generates 1TB of raw data per day Analytics are vital to securing everything in the IoT

Threat Intelligence: Unprecedented Breadth & Depth 100TB Security Intelligence 150,000 Microapplications 5,500 IPS Signatures 5B Daily Email Connections Innovation Platform Products Services Enterprise Security Threat Intelligence Platform Core Data Processing Statistical Computing Load-Balanced, Highly Available APIs Direct Access to Raw and Refined Data 1.6M Deployed Devices 93B Daily Email Messages 150M Deployed Endpoints 1,000 Applications Visualization Incubation Hosting Data Cleansing Data Scientists Column Family Story Security Engineers R&D/Data Analysis/Refinement Document Database Software Engineers Graph Database Security Scientists IT Services Streaming Processes Map/Reduce Processes 13B Web Requests 35% Enterprise Email 3-5 min Updates 4.5B Daily Email Blocks Service Monitoring Security Monitoring Identity Access & Management Relational Databases Hadoop HDFS Data Integration Cluster Consumer Clients for Messages Data Integration Scripts DC & WAN Management Source Code Management Message System Broker Proxy and Services 120K Sandbox Reports 75,000 FireAMP Updates 6,000 New Clam AV Sigs 14M Deployed Access Gateway Internal and External Datasets for Telemetry, Network Posture, Enrichment,and Reputation

Emerging Security Technology: We All Need Innovators and Partners

Give and Take Integration Ecosystem

Security Companies to Watch

The Bottom Line: In the Internet of Everything Era Every company must be a technology company And every company must be a SECURITY company

IPv4 = 3B Addresses, One for Every Two People on Earth You are here IPv6 = 252 Addresses for Every Star in the Known Universe

Thank You.