keeping the networks secure, by harvinder s rajwant, vice president- security, borderless networks

16
Cybersecurity: Trust, Visibility, Resilience Harvinder S Rajwant Vice President , Borderless Network - Security

Upload: cisco-systems-connected-government

Post on 02-Nov-2014

1.245 views

Category:

Technology


0 download

DESCRIPTION

Cisco India recently sponsored 'Network Centric Warfare in the Indian Context', a focused discussion on 21st April 2011, organized by CLAWS and SP Guide.Cisco Expert Harvinder Rajwant shared his views on keeping the network secure by taking pro-active steps to stay ahead of threat and customizing your security endeavours to meet your business objectives

TRANSCRIPT

Page 1: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Cybersecurity: Trust, Visibility, Resilience

Harvinder S Rajwant

Vice President , Borderless Network - Security

Page 2: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

With Pervasive Connectivity

WhatWhat is at stake?is at stake?

Page 3: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Cybersecurity Threats

ManipulationManipulation EspionageEspionage DisruptionDisruption

Page 4: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

“financial terrorism (in 2008) may have cost the global economy as much as $50 trillion.” Pentagon Report

Chinese Hackers Target Indian Government Chinese Hackers Target Indian Government Techtree News Staff, Apr 07, 2010 1700 hrs IST

“With a yearly budget of $55 million allotted for it and over 10,000 hackers working in tandem”

Page 5: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

“Currently on Chinese military drawing boards are plans for combat aircraft, the Chengdu J-10 and Xian JH-7A fighter jets; a combat helicopter, the Z-10; advanced warships; and even space-based weapons

The Economic Times report on 17th Sept 2010: In Hong Kong on Friday 300 of the world's top law

enforcement officials concluded the first ever

international police anti- Cybercrime conference, facing

Popular Mechanic

warships; and even space-based weapons designed to knock out communications satellites. U.S. observers fear that much of this will be made possible by espionage.”

international police anti- Cybercrime conference, facing

the stark and growing threat from an estimated

$105 billion illegal business.

Page 6: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

How? Advanced Malware: Stuxnet

Target: Iranian Nuclear

Reactors

Impact: 2-5 Year Delay

Exploit: Siemens PLC

Software

Origin: Unknown

Page 7: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Changing Environment - Shifting Borders

Mobile Devices &

Mobile Comm

Location Border

Mobile Devices & Sensors

Device Border

Video/Cloud

IaaS,SaaS

Application Border

HeadquartersApplications Tactical

Applications

Page 8: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Approach to Cybersecurity

Identify and

Manage

Respond

and RecoverPrevent and

Detect

Page 9: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Inside Threat

Data Capacity

Identity/Access

Visibility

Trust

Mission: CybersecurityCisco IS the Cyber secure PlatformCisco IS the Cyber secure Platform

Customer

Requirements

Data Loss

Trustworthiness

Resilience

Trust Identify and Manage

Challenges Solution Framework

Solutions Supply Chain Compliance

Page 10: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Trust: Identify and Manage

Cisco Solutions Cisco Service Offerings

Customer

Challenges

•What is on my

Network

•Access Control Policy

•Cross Domain

•Coalition Sharing

•BRAC movement

•Mobile Devices

•Secure Supply Chain

•TrustSec

•Secure Mobility

•CleanAir Secure

Wireless/Sweep Alpha

•Configuration Management

•Secure Supply Chain

•Cyber Security Readiness

•Identity Readiness

•Supply Chain Assessment

•Staff Augmentation

Page 11: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Visibility: Prevent and Detect

Cisco Solutions Cisco Service Offerings

Customer

Challenges

•Situational Awareness

•Threat Visibility

•Common Operating

Picture

•Loss of Data

•Application Usage

•Incident Response

•Security Intelligence

Operations (SIO)

•Cisco Security Appliances

•Service Control Engine

•IOS Security Features

•Data Loss Prevention

•Threat Intelligence

Services

•Computer Security

Incident Response

Team training

•Staff Augmentation

Page 12: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Resilience: Respond and Recover

Cisco Solutions Cisco Service Offerings

Customer

Challenges

•Mission Assurance

•Continuity of Operations

•Critical Applications

•Network as the Platform

•“Turn it On” IOS Security

Features

•Cisco Works Management

•Cisco Threat Mitigation

services

•Teleworker Solutions

•IOS Security Enablement

•“Turn it On” service

•Risk and Architecture

Security Assessment

•Staff Augmentation

Page 13: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Defense Cybersecurity

WhatWhat is Cisco’s Role?is Cisco’s Role?

Page 14: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Why Cisco? Everything is on the Network

“No single company

can solve the complex

challenge presented

by the Internet,

but the inherent role

“No single company

can solve the complex

challenge presented

by the Internet,

but the inherent role but the inherent role

of the network

positions Cisco as the

natural partner in

developing and

executing a successful

cybersecurity strategy”

but the inherent role

of the network

positions Cisco as the

natural partner in

developing and

executing a successful

cybersecurity strategy”

Page 15: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks

Data Center/

Virtualization

Collaboration

• Cisco Works LMS 4.0

• Cisco Configuration Engine

• Cisco TrustSec (Identity)

• Cisco AnyConnect Client

• Cisco VPN Services

• Cisco Mobility Engine &

Wireless Solution

• Cisco Unified Border Element

• ASA Firewall

• IOS Firewall

TRUST

VISIBILITY

•Access Control

•Audit & Accountability

•Configuration Management

•Identification &

•Authentication

Maintenance

•System & Communication

Protection

NIS

T 8

00

-53

Critical Control Family

Identity and Access

Secure Mobility

Wireless Integrity

Audit and Compliance

Configuration Assurance

Physical Security

SOLUTIONS ARCHITECTURESSTRATEGY

Borderless

Networks

•Contingency Planning

•System & Communication

Protection

•Incident Monitoring

•Physical & Environmental

• Performance Routing

• NSF/SSO

• EnergyWise

• Policy Based Routing

• Security Intelligence

Operations

• IPS 4200 Series

• Clean Air Technology

• NBAR

• IOS Intrusion Prevention

• IOS NetFlow

• Service Control Engine

• ASA BotNet Filter

VISIBILITY

RESILIENCE

•Security Assessment &

Authorization

•System & Communication

Protection

•System & Information

Integrity

•Incident Monitoring

NIS

T 8

00

-53

NIS

T 8

00

-53

Critical Control Family

Critical Control Family

Continuous Monitoring

Data Exfiltration

Boundary Defense

Malware Defense

Situational Awareness

COOP

Incident Handling

Availability

Service Level Assurance

Page 16: Keeping the Networks Secure, by Harvinder S Rajwant, Vice President- Security, Borderless Networks