Reduce Security Risks to Protect Your Network

Slides:



Advertisements
Similar presentations
RiskView, R3 and CERT-RMM The Where, What and How of Operational Resilience.
Advertisements

Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Public Building Trustworthy Systems Overview and Strategy 2013 RSA Conference January.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Cisco’s Application Development Transformation to Openstack - Retrospective.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Smart Net Total Care Partner Smart Talk Series – August 20 th, 2013 Smart.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Stephen S. Yau CSE , Fall Security Strategies.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Patch Management Strategy
IT:Network:Microsoft Applications
© 2012 Autodesk How to Establish Autodesk® PLM 360 as the Platform for Enabling PLM and Related Processes Prayush Saraswat PLM Business Process Consultant.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A Balancing Act Between Risk Appetite and Risk Tolerance Federal Information Systems Security Educators’ Association Conference March 2005 Ezra Cornell.
IT Security Requirements Under the HITECH Act RA for MU and Continuous Monitoring Lisa Broome, RPMS ISSO.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Secure Cloud Solutions Open Government Forum Abu Dhabi April 2014 Karl Chambers CISSP PMP President/CEO Diligent eSecurity International.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Why and How to Manage your infrastructure lifecycle? David Baudrez Vertical.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
ORDER ENVIRONMENTAL PROTECTION PROGRAM WORKSHOP ENVIRONMENTAL MONITORING JAMES BACHMAIER
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
IT Controls Global Technology Auditing Guide 1.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
1 What does Cybersecurity Risk Management at UW-Madison look like? Initiate DesignImplement Operate & Maintain Operate it Securely Build it Right RMF Categorize.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Services & Support World Class Partners Technical Support Services Advanced.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Cisco Capital Easy Pay to support Cisco DNA (Core Refresh)
Digital Solutions Extension Framework Mark Myers Director, Global Solutions Go-To-Market July 12, 2016 Solution Partner Forum.
Defining your requirements for a successful security (and compliance
Agenda Enterprise Situational Awareness Active Defense
Sell Network Optimization Service Risk Assessment
Microsoft Cloud Adoption Framework Workshop
Lessons Learned in Managing IT Risk
Portfolio Transformation for Cisco Services Partners
: CCNA Security Certification
Lifecycle Services for Advanced Wireless LAN (LCSAWLAN) practice-questions.html.
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 431 Education for Service/tutorialrank.com
CMGT 431 Teaching Effectively-- snaptutorial.com.
CMGT 431 STUDY Education for Service- -cmgt431study.com.
Information Security Services CIO Council Update
Securing Your Digital Transformation
IT Development Initiative: Status and Next Steps
How to Operationalize Big Data Security Analytics
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
IS4680 Security Auditing for Compliance
Structure of the Internal Audit Service
Holistic Approach to Information Security
Healthcare Cloud Security Stack for Microsoft Azure
Employee Security Awareness
CYBERSECURITY IS A Business Issue
Microsoft Data Insights Summit
Healthcare Cloud Security Stack for Microsoft Azure
In the attack index…what number is your Company?
LM 7. Mobile Network Overview
V1.1 1.
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

Reduce Security Risks to Protect Your Network Presented by: Tim Levad © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 1

Six Areas You Need to An Optimized Network is the Foundation for Business Innovation & Outcomes CiscoSmartTalk Security & Risk Analytics & Modeling Six Areas Operations Efficiency & Automation Architecture Strategy & Planning You Need to Address Compliance & Change Management Operations Support & Lifecycle Management © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 2

Security & Risk © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 3

• Assessing and evolving your security strategy Agenda • Assessing and evolving your security strategy • Maintaining your security posture • Security services to help prepare your network © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 4

When was the last time you validated your security posture? © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 5

Do you know what weak links are? © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 6

The Vulnerability Lifecycle Identify Risk Validate Removal of Risk Prioritize Risk Remediate Risk © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 7

Validate Your Current Security Posture Current State Desired State Strategy Map © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 8

Assess Risk Based on Your Needs Assessment Examples Perimeter Assessment Wireless Assessment Device Security Assessment © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 9

What does an Assessment look like? Review © 2015 Cisco and/or its affiliates. All rights reserved. Probe Analyze Recommend #CiscoSmartTalk 10

Uncovering Risk Agents IT Staff Management © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 11

Prioritize Risk Based on Your Business © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 12

Develop a Risk Framework © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 13

Risk Remediation Strategy © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 14

Protection by Segmentation Agents IT Staff Management © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 15

Validate Risk Removal Agents IT Staff Management © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 16

Recap: The Vulnerability Lifecycle Identify Risk Validate Removal of Risk Prioritize Risk Remediate Risk © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 17

Cisco Security Services Network Optimization Service Security Optimization Service Managed Threat Defense © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 18

Resources Cisco 2015 Annual Security Optimization Defense At-A-Glance Security Report Security Optimization Service At-A-Glance Managed Threat Defense At-A-Glance © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 19

Learn More About Security & Risk 30-MIN WEBINAR © 2015 Cisco and/or its affiliates. All rights reserved. #CiscoSmartTalk 20

www.pptok.com 整理发布