paul king director, threat intelligence ciscosystems

18
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Paul King Director, Threat Intelligence CiscoSystems

Upload: gabriel-pitts

Post on 30-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Installing Chart Templates

Paul KingDirector, Threat IntelligenceCiscoSystems 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#

Paul KingFebruary 4th, 2014Securing Critical InfrastructureThe Networks Role in Securing CyberspaceDirector, Threat [email protected] 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential# 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#2The Industrialization of Hacking 2000199019952005201020152020Viruses19902000Worms20002005Spyware and Rootkits2005TodayAPTs CyberwareToday +Hacking Becomesan IndustrySophisticated Attacks, Complex LandscapePhishing, Low Sophistication 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#3CriminalHacktivistThreat ActorsState Sponsored 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#4

100% of Corporate Networks Exhibit Malicious Traffic 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#5

Perimeter-based Defenses Are No Longer Adequate to Protect Critical AssetsVirtualization is moving data into the cloudMobile access changes the gameAssume that your network has been compromised...now what?- Before- During- After

2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#6The Proliferation of Connected Devices Creates New Challenges for Cybersecurity

Total 35 Billion5 Devices perPerson on Earth

Total 1 Trillion140 Devices perPerson on Earth

Total 500 Million1/10th of a Device per Person on EarthSource: Forrester Research, Cisco70x30x 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#7

Introducing the Architecture of Trust To Address Todays Cybersecurity Challenges1 Trusted Processes

2 Trusted Systems3 Trusted Services 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#8

provide the blueprint

Trusted Processes

CertificationTrainingProcurementDeploymentManagementRefresh 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#9

Basic Hygiene: Asset Management, Configuration Management, Lifecycle ManagementTable stakes for cybersecurity80% of known threatsNetwork assessments 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#10

Many Networks Support Advanced Security Features Which Have Not Been EnabledLatent capability in deployed networksGuidelines for secure configurationTurn it on: Embedded Cisco IOS cyber-security capabilities 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#11

Trusted Systems

provide the foundationResilience: Respond, recover and report Visibility: Prevent and detectTrust: Identify and Manage 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#12Visibility : Prevent and Detect100TBSecurity Intelligence1.6MDeployed Devices13BWeb Requests150,000Micro-applications1,000Applications93BDaily Email Messages35%Enterprise Email5,500IPS Signatures150MDeployed Endpoints3-5 minUpdates5BDaily Email Connections4.5BDaily Email Blocks 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#13

Trusted Services

provide the living spaceIdentity-based access controlSecure mobile accessSecure cloud migration 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#14Identity-based Access Enforces Policy Based on User, Device, and Context

Visibility into who and what is connected to your networkAutomation for simplifying operations and adapting to changing needsControls for limiting access to information and resourcesCisco Identity Services Engine (ISE), TrustSec, Security Group Tags, AnyConnect 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#15Secure Mobile Access Helps Managers Cope with the Proliferation of Mobile Devices

TrustedWiFi

Is Mr. Allens lab work ready yet?Not yet but i will let you know the moment it arrives

Bring Your Own Device... Consumerization of IT (AnyConnect, ASA, IronPort)Wireless LAN security (IDS, Clean Air)Teleworkers and the virtual office (CVO) 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#16Cisco Cybersecurity Resources17

Security Educationwww.cisco.com/go/securityeducationSecurity Intelligence Operationswww.cisco.com/security

Architecture of Trustwww.cisco.com/web/strategy/docs/gov/Architecture_of_Trust_WP.pdfCisco Annual Security Reportwww.cisco.com/go/securityreport

2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#[email protected] you. 2011 Cisco and/or its affiliates. All rights reserved.Cisco Confidential#18