+ All Categories
Home > Technology > Threat-Centric Security for the Digital World

Threat-Centric Security for the Digital World

Date post: 15-Apr-2017
Category:
Upload: cisco-emear
View: 721 times
Download: 0 times
Share this document with a friend
30
1 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat-Centric Security for the Digital World Adam Philpott Director, Cisco Cyber Security EMEAR Gartner Symposium 2015 @ARPhilpott
Transcript
Page 1: Threat-Centric Security for the Digital World

1© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Threat-Centric Security for the Digital WorldAdam Philpott Director, Cisco Cyber Security EMEARGartner Symposium 2015 @ARPhilpott

Page 2: Threat-Centric Security for the Digital World

Why Do Cars Have Brakes?

Page 3: Threat-Centric Security for the Digital World

To Go Faster, safely.

Page 4: Threat-Centric Security for the Digital World

Cisco Confidential

Unlocking the $19T Opportunity for Our Customers

Page 5: Threat-Centric Security for the Digital World

TV Music BankingCisco Confidential

Digital Transformation in Every Industry

Retail Transportation

Public Sector

E-Govt

Page 6: Threat-Centric Security for the Digital World

6© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Rapid Digital Disruption On a Massive Scale

500BIn 2030

50BIn 202015B

Devices Today

6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 7: Threat-Centric Security for the Digital World

7© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Rapid Digital Disruption On a Massive Scale

7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

More Connections

= More

Opportunity

Page 8: Threat-Centric Security for the Digital World

8© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Rapid Digital Disruption On a Massive Scale

8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

…for hackers too!

Page 9: Threat-Centric Security for the Digital World

The Global Hacker Economy is 3x to 5x the size of the security industry.Industrialization of Hacking.

Source: Center for Strategic and International Studies, 2014 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 10: Threat-Centric Security for the Digital World

10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

If you knew you were going to be compromised would you do security differently?

Page 11: Threat-Centric Security for the Digital World

11© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Security Challenges

Digitization and Changing

Business Models

Dynamic Threat

Landscape

Complexityand

Fragmentation

Talent Shortage

Cisco Confidential

Page 12: Threat-Centric Security for the Digital World

12© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

The Next Wave of the Internet Requires

the Next Wave of Security

Page 13: Threat-Centric Security for the Digital World

13© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Threat-Centric Security

BEFORE AFTERDURING

ATTACK CONTINUUM

Page 14: Threat-Centric Security for the Digital World

14© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Visibility Context Intelligence

Security Everywhere

Control

Page 15: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 15

Silos Create Security Complexity

W W W

Context- Aware

FunctionsIPS

FunctionsMalware

Functions

VPNFunctions

Traditional Firewall

Functions

Page 16: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Visibility: Both Breadth and Depth

Network Endpoint Mobile Virtual Cloud

BREADTH

DEPTHWho What Where When How

Page 17: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

?

Threat-Focused

Page 18: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 18

Detect, Understand, and Stop Threats

?

Collective Security Intelligence

Threat Identified

Event History

How

What

Who

Where

When

ISE + Network, Appliances (NGFW/NGIPS)Context

AMP, CWS, Appliances

Recorded

Enforcement

Page 19: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 19

Continuous Advanced Threat Protection

ISE + Network, Appliances (NGFW/NGIPS)

How

What

Who

Where

When

Collective Security

Intelligence

AMP, CWS, AppliancesEnforcement

Event History

AMP, Threat DefenseContinuous AnalysisContext

Page 20: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 20

Collective Security Intelligence

IPS Rules

MalwareProtection

ReputationFeeds

Vulnerability Database Updates

AEGIS™ Program

Private and Public

Threat FeedsSandnets FireAMP™

Community Honeypots

Advanced Microsoft and Industry Disclosures

SPARK ProgramSnort and ClamAV

Open Source Communities

Malware Samples(>1,100,000 per

Day)

Cisco Talos(Talos SecurityIntelligence and

Research Group)

SandboxingMachine Learning

Big Data Infrastructure

Page 21: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 21

Increases Visibility Accelerates Detection Scales Enforcement

Synergies Through IntegrationThe Network and Security

Page 22: Threat-Centric Security for the Digital World

22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

See Once, Protect Everywhere

WWW

HeadquartersBranch

Broad Visibility

Threat Intelligence

Virtual Offices

Page 23: Threat-Centric Security for the Digital World

23© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco Security Services Portfolio

Optimization

Migration

Integration

Program Strategy

Architecture & Design

Assessments

Product SupportHosted Security

Managed Security

ManagedServices

Advisory Integration

Page 24: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 24

Ecosystem

Mobility (MDM), Threat (SIEM), CloudPartner to Deliver Complete Solutions

Open Platform Architecture EnablesDevelop SSP Partner Ecosystem

ISE as “Context Directory Service”Embed Security in Broader IT Solutions

Lancope, Network as a SensorDrive the Value of the Network

Cisco Current Partner Ecosystem

Page 25: Threat-Centric Security for the Digital World

25© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

The Cisco Advantage

Best of Breed PortfolioArchitectural Approach

Page 26: Threat-Centric Security for the Digital World

26© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Security Investment

#1 Cybersecurity

Company

Threat-Centric Security

BillionsInvested

5KStrong

CognitiveSourcefire

ThreatGRIDNeohapsisOpenDNS

Broad/Deep Portfolio

Accelerating Customer Adoption

Cisco’s #1 Priority

Expanding Services

Capabilities

SecurityEverywhere

26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 27: Threat-Centric Security for the Digital World

27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

“Cisco Is Going on a Security Push”

Partnering with Cisco = A Smart Investment

Cisco’s Security Everywhere... “that’s pretty brilliant”

Cisco…best traction among security vendors

Cisco’s Network Security Portfolio Finally Stands On Its Own Merit

Security Value Map Leader• Breach Detection • Next-Gen Firewall• Intrusion Prevention

System

#1 Market Share• Network Security• Email (Appliances

and software)• Web (SaaS)

2015 Vendor Rating for Security: Positive

Page 28: Threat-Centric Security for the Digital World

28© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

1100001110001110 1001 1101 1110011 0110011 101000 0110 00

Security AdvantageIntelligence Built on Unmatched Collective Security Telemetry

101000 0110 00 0111000 111010011 101 1100001 1101100001110001110 1001 1101 1110011 0110011 101000 0110 00

1001 1101 1110011 0110011 101000 0110 00

100 TBof data received per day

1.1 million+ file samples per day

600+engineers, and researchers

19.6 billionthreats blocked per day

24x7x365 operations

40+languages

101000 0110 00 0111000 111010011 101 1100001 1101100001110001110 1001 1101 1110011 0110011

101000 0110 00

1001 1101 1110011 0110011 101000 0110 00 Cisco® Talos

Email Endpoints Web Networks IPS Devices

WWW

Cisco CollectiveSecurity Intelligence

Policy & Access

Email Web

NGFW/NGIPS

AdvancedThreat

ManagedServices

Advisory Integration

Cisco Breadth, Collaboration and Methodology

Page 29: Threat-Centric Security for the Digital World

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 29

Summary

Consistent Control

ReducedComplexity

Consistent Policies Across the

Network and Data Center

Fits and Adapts to Changing

Business Models

Global Intelligence With the Right

Context

Detects and Stops Advanced Threats

Advanced Threat Protection

UnmatchedVisibility

Page 30: Threat-Centric Security for the Digital World

Recommended