Download - Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks
Cybersecurity: Trust, Visibility, Resilience
Harvinder S Rajwant
Vice President , Borderless Network - Security
With Pervasive Connectivity
WhatWhat is at stake?is at stake?
Cybersecurity Threats
ManipulationManipulation EspionageEspionage DisruptionDisruption
“financial terrorism (in 2008) may have cost the global economy as much as $50 trillion.” Pentagon Report
Chinese Hackers Target Indian Government Chinese Hackers Target Indian Government Techtree News Staff, Apr 07, 2010 1700 hrs IST
“With a yearly budget of $55 million allotted for it and over 10,000 hackers working in tandem”
“Currently on Chinese military drawing boards are plans for combat aircraft, the Chengdu J-10 and Xian JH-7A fighter jets; a combat helicopter, the Z-10; advanced warships; and even space-based weapons
The Economic Times report on 17th Sept 2010: In Hong Kong on Friday 300 of the world's top law
enforcement officials concluded the first ever
international police anti- Cybercrime conference, facing
Popular Mechanic
warships; and even space-based weapons designed to knock out communications satellites. U.S. observers fear that much of this will be made possible by espionage.”
international police anti- Cybercrime conference, facing
the stark and growing threat from an estimated
$105 billion illegal business.
How? Advanced Malware: Stuxnet
Target: Iranian Nuclear
Reactors
Impact: 2-5 Year Delay
Exploit: Siemens PLC
Software
Origin: Unknown
Changing Environment - Shifting Borders
Mobile Devices &
Mobile Comm
Location Border
Mobile Devices & Sensors
Device Border
Video/Cloud
IaaS,SaaS
Application Border
HeadquartersApplications Tactical
Applications
Approach to Cybersecurity
Identify and
Manage
Respond
and RecoverPrevent and
Detect
Inside Threat
Data Capacity
Identity/Access
Visibility
Trust
Mission: CybersecurityCisco IS the Cyber secure PlatformCisco IS the Cyber secure Platform
Customer
Requirements
Data Loss
Trustworthiness
Resilience
Trust Identify and Manage
Challenges Solution Framework
Solutions Supply Chain Compliance
Trust: Identify and Manage
Cisco Solutions Cisco Service Offerings
Customer
Challenges
•What is on my
Network
•Access Control Policy
•Cross Domain
•Coalition Sharing
•BRAC movement
•Mobile Devices
•Secure Supply Chain
•TrustSec
•Secure Mobility
•CleanAir Secure
Wireless/Sweep Alpha
•Configuration Management
•Secure Supply Chain
•Cyber Security Readiness
•Identity Readiness
•Supply Chain Assessment
•Staff Augmentation
Visibility: Prevent and Detect
Cisco Solutions Cisco Service Offerings
Customer
Challenges
•Situational Awareness
•Threat Visibility
•Common Operating
Picture
•Loss of Data
•Application Usage
•Incident Response
•Security Intelligence
Operations (SIO)
•Cisco Security Appliances
•Service Control Engine
•IOS Security Features
•Data Loss Prevention
•Threat Intelligence
Services
•Computer Security
Incident Response
Team training
•Staff Augmentation
Resilience: Respond and Recover
Cisco Solutions Cisco Service Offerings
Customer
Challenges
•Mission Assurance
•Continuity of Operations
•Critical Applications
•Network as the Platform
•“Turn it On” IOS Security
Features
•Cisco Works Management
•Cisco Threat Mitigation
services
•Teleworker Solutions
•IOS Security Enablement
•“Turn it On” service
•Risk and Architecture
Security Assessment
•Staff Augmentation
Defense Cybersecurity
WhatWhat is Cisco’s Role?is Cisco’s Role?
Why Cisco? Everything is on the Network
“No single company
can solve the complex
challenge presented
by the Internet,
but the inherent role
“No single company
can solve the complex
challenge presented
by the Internet,
but the inherent role but the inherent role
of the network
positions Cisco as the
natural partner in
developing and
executing a successful
cybersecurity strategy”
but the inherent role
of the network
positions Cisco as the
natural partner in
developing and
executing a successful
cybersecurity strategy”
Data Center/
Virtualization
Collaboration
• Cisco Works LMS 4.0
• Cisco Configuration Engine
• Cisco TrustSec (Identity)
• Cisco AnyConnect Client
• Cisco VPN Services
• Cisco Mobility Engine &
Wireless Solution
• Cisco Unified Border Element
• ASA Firewall
• IOS Firewall
TRUST
VISIBILITY
•Access Control
•Audit & Accountability
•Configuration Management
•Identification &
•Authentication
Maintenance
•System & Communication
Protection
NIS
T 8
00
-53
Critical Control Family
Identity and Access
Secure Mobility
Wireless Integrity
Audit and Compliance
Configuration Assurance
Physical Security
SOLUTIONS ARCHITECTURESSTRATEGY
Borderless
Networks
•Contingency Planning
•System & Communication
Protection
•Incident Monitoring
•Physical & Environmental
• Performance Routing
• NSF/SSO
• EnergyWise
• Policy Based Routing
• Security Intelligence
Operations
• IPS 4200 Series
• Clean Air Technology
• NBAR
• IOS Intrusion Prevention
• IOS NetFlow
• Service Control Engine
• ASA BotNet Filter
VISIBILITY
RESILIENCE
•Security Assessment &
Authorization
•System & Communication
Protection
•System & Information
Integrity
•Incident Monitoring
NIS
T 8
00
-53
NIS
T 8
00
-53
Critical Control Family
Critical Control Family
Continuous Monitoring
Data Exfiltration
Boundary Defense
Malware Defense
Situational Awareness
COOP
Incident Handling
Availability
Service Level Assurance