@cisco @cisco_la ciberseguridad en la organización digital
TRANSCRIPT
![Page 1: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/1.jpg)
Juan Marino
Cuando la prevención no es suficiente
Ciberseguridad en La Organización Digital
![Page 2: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/2.jpg)
Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.
![Page 3: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/3.jpg)
Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Digitalización
Camino
Amenazas
![Page 4: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/4.jpg)
![Page 5: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/5.jpg)
Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
el panorama de amenazas
![Page 6: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/6.jpg)
![Page 7: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/7.jpg)
![Page 8: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/8.jpg)
Datakinesis
![Page 9: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/9.jpg)
Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved.
![Page 10: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/10.jpg)
Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
![Page 11: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/11.jpg)
![Page 12: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/12.jpg)
vulnerable
Fuera de Soporte
Obsoleto
92%
31%
5%
La confiabilidad genera complacencia
![Page 13: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/13.jpg)
La conciencia erosiona la confianza
59% Confianza en contar con infraestructuraactualizada
51% Confianza en detectar unavulnerabilidad a tiempo
54% Confianza en poderdefenderse frente a un ataque
45% Confianza en poderidentificar y contener un ataque
54% Confianza en poderverificar un ataque
56% Revisa políticas de seguridad de regularmente
-5% 0% -4%
-1% +0% +0%
![Page 14: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/14.jpg)
Nadie puede detener todos los ataques
![Page 15: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/15.jpg)
1. La seguridad debeconsiderarse motor de crecimiento para el negocio
![Page 16: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/16.jpg)
![Page 17: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/17.jpg)
Atributos de una Arquitectura de Ciberseguridad
![Page 18: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/18.jpg)
Control SimplicidadProtecciónAvanzada
Visibilidad
Seguridad Efectiva y Eficiente
Segmentación Aplicación de PolíticasResiliencia
![Page 19: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/19.jpg)
Seguridad es la prioridad #1 de Cisco
![Page 20: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/20.jpg)
Innovation and Commitment to Being #1 in Security
CLUS: AMP
Data Center
Sourcefire
Acquisition
Closed
Security
for ACI
RSAC: AMP
Everywhere
OpenAppID
2014 ASR
Global
Security Sales
Organization
Neohapsis
Acquired
AMP Everywhere
ThreatGRID
Acquired
Cisco ASA with
FirePOWER
Services
Security
and Trust
Organization
Managed
Threat
Defense
TalosIntegrated
Threat
Defense
2013 2015
Security
Everywhere
OpenDNS
Acquisition
Closed
![Page 21: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/21.jpg)
Prevención
![Page 22: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/22.jpg)
Prevención Retrospección
+
![Page 23: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/23.jpg)
Contextla amenaza depende del contexto
Policyla política reduce la superficie de ataque
Threatfoco en la amenaza, detectar, entender, detener
Breachcomprender impacto, contener y remediar
![Page 24: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/24.jpg)
Breach
Context
Policy
Threat
Scope
Contain
Remediate
Detect
Block
Defend
Control
Enforce
Harden
Discover
Monitor
Inventory
Map
Network / Devices
Users / Applications
Files / Data
BEFORE DURING AFTER
![Page 25: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/25.jpg)
Breach
Context
Policy
Threat
Scope
Contain
Remediate
Detect
Block
Defend
Control
Enforce
Harden
Discover
Monitor
Inventory
Map
Network / Devices
Users / Applications
Files / Data
Control de
Acceso
BEFORE DURING AFTER
De Intrusión De Archivos
![Page 26: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/26.jpg)
Breach
Context
Policy
Threat
Scope
Contain
Remediate
Detect
Block
Defend
Control
Enforce
Harden
Discover
Monitor
Inventory
Map
Network / Devices
Users / Applications
Files / Data
Control de
Acceso
BEFORE DURING AFTER
De Intrusión De Archivos
![Page 27: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/27.jpg)
Breach
Context
Policy
Threat
Scope
Contain
Remediate
Detect
Block
Defend
Control
Enforce
Harden
Discover
Monitor
Inventory
Map
Network / Devices
Users / Applications
Files / Data
Control de
Acceso
BEFORE DURING AFTER
De Intrusión De Archivos
Malo ConocidoConocido /
SospechosoDesconocido
![Page 28: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/28.jpg)
Breach
Context
Policy
Threat
Scope
Contain
Remediate
Detect
Block
Defend
Control
Enforce
Harden
Discover
Monitor
Inventory
Map
Network / Devices
Users / Applications
Files / Data
Control de
Acceso
BEFORE DURING AFTER
De Intrusión De Archivos
Malo ConocidoConocido /
SospechosoDesconocido
Contener DimensionarRemediar
![Page 29: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/29.jpg)
Host-based Security
Wireless
L2//L3 Network
L2//L3 Network
Host-based Security
Identity Posture Assess-ment
CEO sending emailto shareholders
Salesmen accessing customer database
Switch
WAN
Flow Analytics
Access Control +TrustSec
Campus
WirelessIntrusionPrevention
Posture Assess-ment
Access Control +TrustSec
Flow Analytics
Wireless Controller
Identity Mobile Device Mgmt
![Page 30: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/30.jpg)
Host-based Security
Wireless
L2//L3 Network
L2//L3 Network
Host-based Security
Identity Posture Assess-ment
CEO sending emailto shareholders
Salesmen accessing customer database
Switch
WAN
Flow Analytics
Access Control +TrustSec
Campus
WirelessIntrusionPrevention
Posture Assess-ment
Access Control +TrustSec
Flow Analytics
Wireless Controller
Identity Mobile Device Mgmt
![Page 31: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/31.jpg)
Host-based Security
Wireless
L2//L3 Network
L2//L3 Network
Host-based Security
Identity Posture Assess-ment
CEO sending emailto shareholders
Salesmen accessing customer database
Switch
Flow Analytics
Access Control +TrustSec
WirelessIntrusionPrevention
Posture Assess-ment
Access Control +TrustSec
Flow Analytics
Wireless Controller
Identity Mobile Device Mgmt
BEFORE
![Page 32: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/32.jpg)
Host-based Security
Wireless
L2//L3 Network
L2//L3 Network
Host-based Security
Identity Posture Assess-ment
CEO sending emailto shareholders
Salesmen accessing customer database
Switch
Flow Analytics
Access Control +TrustSec
WirelessIntrusionPrevention
Posture Assess-ment
Access Control +TrustSec
Flow Analytics
Wireless Controller
Identity Mobile Device Mgmt
AFTER
![Page 33: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/33.jpg)
Host-based Security
Wireless
L2//L3 Network
L2//L3 Network
Host-based Security
Identity Posture Assess-ment
CEO sending emailto shareholders
Salesmen accessing customer database
Switch
WAN
Flow Analytics
Access Control +TrustSec
Campus
WirelessIntrusionPrevention
Posture Assess-ment
Access Control +TrustSec
Flow Analytics
Wireless Controller
Identity Mobile Device Mgmt
![Page 34: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/34.jpg)
Data Center
L2//L3 Network
Access Control +TrustSec
To Campus
Shared Services
Zone
Next-Gen Intrusion Prevention System
App Server
Zone
PCICompliance
Zone
DatabaseZone
Flow Analytics
Host-based Security
Load Balancer
Flow Analytics
Firewall
Anti-Malware
Threat Intell-igence
Access Control +TrustSec
Next-Gen Intrusion Prevention System
Next-Generation Firewall Router
L2//L3 NetworkFirewall VPN
Switch
Web Application Firewall
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
Logging/Reporting
ThreatIntelligence
VulnerabilityManagement
Monitoring
To Edge
Virtualized Capabilities
WAN
![Page 35: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/35.jpg)
Access
Control +
TrustSec
Next-Gen
Intrusion
Prevention
SystemAnti-
Malware
Threat
Intell-
igence
Access Control +TrustSec
Next-Generation Firewall Router
L2//L3
NetworkFirewall VPN
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
WAN
![Page 36: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/36.jpg)
Access
Control +
TrustSec
Next-Gen
Intrusion
Prevention
SystemAnti-
Malware
Threat
Intell-
igence
Access Control +TrustSec
Next-Generation Firewall Router
L2//L3
NetworkFirewall VPN
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
WAN
![Page 37: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/37.jpg)
Access
Control +
TrustSec
Next-Gen
Intrusion
Prevention
SystemAnti-
Malware
Threat
Intell-
igence
Access Control +TrustSec
Next-Generation Firewall Router
L2//L3
NetworkFirewall VPN
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
WAN
![Page 38: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/38.jpg)
Data Center
L2//L3 Network
Access Control +TrustSec
To Campus
Shared Services
Zone
Next-Gen Intrusion Prevention System
App Server
Zone
PCICompliance
Zone
DatabaseZone
Flow Analytics
Host-based Security
Load Balancer
Flow Analytics
Firewall
Anti-Malware
Threat Intell-igence
Access Control +TrustSec
Next-Gen Intrusion Prevention System
Next-Generation Firewall Router
L2//L3 NetworkFirewall VPN
Switch
Web Application Firewall
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
Logging/Reporting
ThreatIntelligence
VulnerabilityManagement
Monitoring
To Edge
Virtualized Capabilities
WAN
BEFORE
![Page 39: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/39.jpg)
Data Center
L2//L3 Network
Access Control +TrustSec
To Campus
Shared Services
Zone
Next-Gen Intrusion Prevention System
App Server
Zone
PCICompliance
Zone
DatabaseZone
Flow Analytics
Host-based Security
Load Balancer
Flow Analytics
Firewall
Anti-Malware
Threat Intell-igence
Access Control +TrustSec
Next-Gen Intrusion Prevention System
Next-Generation Firewall Router
L2//L3 NetworkFirewall VPN
Switch
Web Application Firewall
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
Logging/Reporting
ThreatIntelligence
VulnerabilityManagement
Monitoring
To Edge
Virtualized Capabilities
WAN
DURING
![Page 40: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/40.jpg)
Data Center
L2//L3 Network
Access Control +TrustSec
To Campus
Shared Services
Zone
Next-Gen Intrusion Prevention System
App Server
Zone
PCICompliance
Zone
DatabaseZone
Flow Analytics
Host-based Security
Load Balancer
Flow Analytics
Firewall
Anti-Malware
Threat Intell-igence
Access Control +TrustSec
Next-Gen Intrusion Prevention System
Next-Generation Firewall Router
L2//L3 NetworkFirewall VPN
Switch
Web Application Firewall
Centralized Management
Policy/Configuration
Visibility/Context
AnalysisCorrelation
Analytics
Logging/Reporting
ThreatIntelligence
VulnerabilityManagement
Monitoring
To Edge
Virtualized Capabilities
WAN
AFTER
![Page 41: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/41.jpg)
![Page 42: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/42.jpg)
Cisco Confidential 43© 2013-2014 Cisco and/or its affiliates. All rights reserved.
![Page 43: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/43.jpg)
![Page 44: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/44.jpg)
Security Services Portfolio
Optimization
Migration
Plan,
Design,
Implement
Program Strategy
Architecture & Design
Assessments
Managed Security
(SOC)
Managed
Services
Advisory Integration
![Page 45: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/45.jpg)
Cisco Confidential 47© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Digitalización
Camino
![Page 46: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/46.jpg)
![Page 47: @Cisco @Cisco_LA Ciberseguridad en la organización digital](https://reader034.vdocuments.site/reader034/viewer/2022050613/587f59f51a28ab0d378b7049/html5/thumbnails/47.jpg)