Cisco Master Security Specialization Practice Areas Summary. June 2015



Similar documents
Cisco Master Security Specialization Practice Areas Summary. February 2016

Cisco Cybersecurity Pocket Guide 2015

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Assessing the Business Value of the Secured Datacenter

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Cloud Infrastructure Security Management

Cisco Cloud Web Security

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Vulnerability Management

Catbird 6.0: Private Cloud Security

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Intelligent Cybersecurity for the Real World

Requirements When Considering a Next- Generation Firewall

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Obtaining Enterprise Cybersituational

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

The Art of Modern Threat Defense. Paul Davis Director, Advanced Threats Security Solution Architects

Intelligence Driven Security

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

SECURITY 2.0 LUNCHEON

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

IBM Security IBM Corporation IBM Corporation

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Braindumps QA

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Bellevue University Cybersecurity Programs & Courses

IINS Implementing Cisco Network Security 3.0 (IINS)

Accenture Cyber Security Transformation. October 2015

Advanced Threat Protection with Dell SecureWorks Security Services

Zak Khan Director, Advanced Cyber Defence

Protection Against Advanced Persistent Threats

THE TOP 4 CONTROLS.

PCI-DSS Penetration Testing

Strategies for assessing cloud security

White Paper: Consensus Audit Guidelines and Symantec RAS

State of Security Monitoring of Public Cloud

Extreme Networks Security Analytics G2 Vulnerability Manager

FFIEC Cybersecurity Assessment Tool

Cisco Advanced Malware Protection

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

The Emergence of Security Business Intelligence: Risk

The Protection Mission a constant endeavor

Security Intelligence

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

End to End Security do Endpoint ao Datacenter

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Cloud Security Trust Cisco to Protect Your Data

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Cisco & Big Data Security

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Secure BYOD Solution

Cisco Network Optimization Service

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Continuous Network Monitoring

Professional Services Overview

Logging In: Auditing Cybersecurity in an Unsecure World

Presented by Frederick J. Santarsiere

I D C A N A L Y S T C O N N E C T I O N

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

What is Security Intelligence?

Comprehensive Security with Splunk and Cisco

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Safeguarding the cloud with IBM Dynamic Cloud Security

Address C-level Cybersecurity issues to enable and secure Digital transformation

White. Paper. Rethinking Endpoint Security. February 2015

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Enabling Digitization with Next Generation Cloud

Payment Card Industry Data Security Standard

Cisco Advanced Services for Network Security

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Protecting against cyber threats and security breaches

PCI DSS READINESS AND RESPONSE

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Cisco Certification Skills Matrix

Department of Management Services. Request for Information

INSERT COMPANY LOGO HERE

Cybersecurity Strategic Consulting

NERC CIP VERSION 5 COMPLIANCE

Threat-Centric Security for Service Providers

Transcription:

Cisco Master Security Specialization Practice Areas Summary June 2015

New Master Security Model Prerequisites Advanced Security Architecture Specialization (ASAS) (1) CCIE Security (1) CCNP Security (1) Fire Jumper (1) Project Management Certification: PMI (PMP) or Prince 2 Partner Executed Proof of Values (POVs) Customer References Onsite Audit Capabilities Validation Onsite Audit Demonstration Onsite Audit Practice Areas

Practice Areas In order to demonstrate that partners have mature security practice capabilities, Cisco Master Security Specialization requirements now include validation of these capabilities during the onsite audit process: Demonstrated capability in at least three out of six specialty areas Demonstrated capability in specialty areas against a customer use case

Potential Products and Tools Description Threat Visibility Network Vulnerability Assessment Remediation and Response Threat Visibility provides awareness of network and application security posture through customer engagements. Threat Visibility reports provide customers with findings to include host and application risks, malware threats, and recommended actions. Network Vulnerability Assessments analyze customer networks with vulnerability scanning and penetration testing tools to provide insight into internal, external, and remote access threats. Assessment reports provide customers with findings to include descriptions of vulnerabilities and recommended corrective actions. Remediation and response is an organized approach to addressing and managing the aftermath of a security breach. Services include response planning, incident investigation, forensics, infection containment, countermeasure development, and risk mitigation. ThreatGrid AMP for Endpoint AMP for Network AMP for Content ESA, WSA, and CWS Threat Analytics Identity Services Engine Prime Infrastructure IOS Software Checker Environment profiling and assessment Threat Analytics ThreatGrid AMP for Endpoint AMP for Network AMP for Content Incident Response Service Threat Analytics Master Security Practice Areas

Potential Products and Tools Description Secure Cloud Secure Data Center Secure IoT Secure Cloud provides or builds a secure environment to meet specific business outcomes including threat protection, acceptable use, data security, secure access, and flexible workloads. Secure Data Center practices address security concerns in virtualized & orchestrated data center environments leveraging Cisco Validated Designs. Cisco solutions offer maximum performance, actionable security, ease of provisioning, and threat detection and defense. Secure IOT converges an organization's existing information technology (IT) and operational technology (OT) networks. Cisco offers physical and cyber security solutions to employ consistent security solutions with centralized management across the extended network while offering differentiated security policies and actionable security intelligence. ESA, ESAv, WSA, WSAv ASA, ASAv Identity Services Engine Intercloud Fabric Application Centric Infrastructure ASA, ASAv Identity Services Engine TrustSec Advanced Threat Analytics AMP for Endpoint AMP for Network AMP for Content Hardened ASA Physical Access Manager Master Security Practice Areas Continued

Audit Requirements for Practice Areas Data sheet with business outcomes Sample statement of work (SOW) One of the following sample deliverables Customer-facing report with recommendations Solution design with network topology and products Service Agreement with SLAs Implementation or operations guide