+ All Categories
Home > Documents > Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development...

Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development...

Date post: 02-Jun-2020
Category:
Upload: others
View: 29 times
Download: 4 times
Share this document with a friend
38
Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa
Transcript
Page 1: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Cyber Security

Kah-Kin HoHead of Cyber Security Business DevelopmentEurope, Middle East and Africa

Page 2: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Agenda

• Cyber Threat Landscape

• Lead Methodology in Countering Cyber Threats

• Security Intelligence Operation

• Summary

•Cyber Threat Landscape

• Lead Methodology in Countering Cyber Threats

• Security Intelligence Operation

• Summary

Page 3: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID

3

Enigma

machine

Page 4: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID 444444444444

Securing the Supply Chain

Page 5: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Current Events

Attempted to steal information

about nuclear Trident program

Hostile State based Intelligence

Agency

Infected with Zeus Trojan- Dec 2010

William Hague

UK Foreign Secretary

47th Munich Security Conference

“…seek international agreement

about norms in CyberSpace”

Page 6: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Data Breach

361 Mil >> 144 Mil >> 4 Mil *

Number of incidents increases.

6* Data from US Secret Service

Malware

Customization

Source: McAfee Avert Labs

Page 7: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

The Long Tail problem

Malware types

Number of

targets

Page 8: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Advanced Malware: Stuxnet

Target: Iranian Nuclear

Reactors

Impact: 2-5 Year Delay

Exploit: Siemens PLC

Software

Origin: Unknown

Page 9: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Firewall

IPS

Web Sec

N-AV

Email Sec

Customized Threat Bypasses

Security Gateways

Threat Spreads

Inside Perimeter

Customized Cyber Threats Evade Existing Security Constructs

Servers

Picking a Needle out of a HaystackCustomized Cyber Threats

Page 10: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

CybercrimeEcosystem

all SPAM is prohibited!

do NOT pay for Russian installs

Page 11: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID 111111111111111111111111

Unique Malware Content

Page 12: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

IntelligenceEvasion

Page 13: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

IntelligenceEvasion

Page 14: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Search EnginePoisoning

Because he believes that the steak,fajita,dry rub, United

Nations is a seasoning recipe corrupt organization that was

designed to undermine sovereignty and…

Page 15: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

The Facebook Vector

Page 16: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

China’sEmergence

Page 17: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID

Motivation: Status and Ego

Page 18: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID

Hackerville: The Romanian cybercriminal hotspot RâmnicuVâlcea

Page 19: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID

Cyber Dimension

….

Investors Financiers Entrepreneurs

Transporters Warehouses Logistics

Distributors Tech Experts Managers

Human

Traffickin

g

Drug

Traffickin

g

Illegal

Firearms

Trade

WMD

Trade

Cyber

Crime

Page 20: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Agenda

• Cyber Threat Landscape

•Lead Methodology in Countering Cyber Threats

• Security Intelligence Operation

• Summary

Page 21: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID

Normality

Capacity

Resource surge capacity

Degraded organization capacity

shock

event

Risk Reduction

Prevent Prepare

Impact Reduction

Respond Recover

Intelligence-led approach

Cisco Security Intelligence Operation

Lead Methodology

Page 22: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Agenda

• Cyber Threat Landscape

• Lead Methodology in Countering Cyber Threats

•Security Intelligence Operation

• Summary

Page 23: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber
Page 24: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber
Page 25: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber
Page 26: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber
Page 27: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID 272727272727272727272727

Deny 13. Allow everything else.

Page 28: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Global Context: Data Makes a Difference

Cisco SIO

Management Services Partners

Application Programming Interfaces

Cisco Infrastructure

Tru

stS

ec

Tru

stS

ec

Network

Context Aware Enforcement

AnyC

onnect

Context Aware Policy

Ne

xu

s 1

K a

nd

Clo

ud

Co

nn

ecte

d N

etw

ork

Page 29: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Threat Operations CenterSensorBase Dynamic Updates

Page 30: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

SensorBase Threat Operations Center Dynamic Updates

WEB REQUESTS

30BMAIL BOXES

1BWORLDWIDE TRAFFIC

35%

GLOBALLY DEPLOYED DEVICES

2 Mil+DATA RECEIVED PER DAY

10 TB

Page 31: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Unmatched Breadth with Global Correlation

SensorBase Threat Operations Center Dynamic Updates

Malware

Distributing Site

Directed

Attack

Spam with

Malicious Attachment

Page 32: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Threat Operations Center

ENGINEERS, TECHNICIANS

AND RESEARCHERS

500LANGUAGES

40+Ph.D.s, CCIE, CISSPs, MSCEs

80+

Dynamic Updates

SPENT IN DYNAMIC RESEARCH

AND DEVELOPMENT

$200MOPERATIONS

24x7x365

Page 33: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Security Support Operations

Current SSO Presence in

the Following Regions:

• California

• Texas

• Ohio

• Idaho

• China

• Ukraine

• UK

• Canada

• India

• Australia

Languages: Arabic, Farsi/Persian, Hebrew, Syriac, Urdu, Bengali, Gujarati, Gurmukhi, Hindi, Marathi, Sinhala, Tamil, Thai, Chinese, Japanese, Korean,

Belarusian, Bulgarian, Kazakh, Macedonian, Russian, Ukrainian, Greek, Armenian, Georgian, Basque, Catalan, Croatian, Czech, Danish, Dutch,

English, Estonian, Filipino, Finnish, French, German, Hungarian, Icelandic, Indonesian, Italian, Malay, Norwegian, Polish, Portuguese, Romanian,

Slovak, Slovene, Spanish, Swedish, Turkish, Vietnamese

Page 34: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Threat Operations Center

PUBLICATIONS PRODUCED

20+PARAMETERS TRACKED

200+RULES per DAY

8M+

Dynamic Updates

IPS SIGNATURES PRODUCED

6,500+MINUTE UPDATES

3 to 5

Page 35: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Cisco

Page 36: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Agenda

• Cyber Threat Landscape

• Lead Methodology in Countering Cyber Threats

• Security Intelligence Operation

•Summary

Page 37: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Size and Quality of Footprint MatterAgility Matters

Page 38: Cyber Security - Cisco · Cyber Security Kah-Kin Ho Head of Cyber Security Business Development Europe, Middle East and Africa. Agenda •Cyber Threat Landscape ... Customized Cyber

Recommended