Download presentation
Presentation is loading. Please wait.
Published byGabriel Pitts Modified over 9 years ago
1
Paul King Director, Threat Intelligence CiscoSystems
2
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Paul King February 4 th, 2014 Securing Critical Infrastructure The Network’s Role in Securing Cyberspace Director, Threat Intelligence pking@cisco.com
3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 200 0 199 0 199 5 200 5 201 0 201 5 202 0 Viruses 1990–2000 Worms 2000–2005 Spyware and Rootkits 2005–Today APTs Cyberware Today + Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape Phishing, Low Sophistication
4
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Criminal Hacktivist State Sponsored
5
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Virtualization is moving data into the cloud Mobile access changes the game Assume that your network has been compromised...now what? - Before - During - After
7
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Total 35 Billion 5 Devices per Person on Earth Total 1 Trillion 140 Devices per Person on Earth Total 500 Million 1/10 th of a Device per Person on Earth Source: Forrester Research, Cisco 70x 30x
8
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 1 Trusted Processes 2 Trusted Systems 3 Trusted Services
9
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 …provide the blueprint Trusted Processes Certification Training Procurement Deployment Management Refresh
10
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Table stakes for cybersecurity 80% of known threats Network assessments
11
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Latent capability in deployed networks Guidelines for secure configuration Turn it on: Embedded Cisco IOS cyber-security capabilities
12
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Trusted Systems …provide the foundation Resilience: Respond, recover and report Visibility: Prevent and detect Trust: Identify and Manage
13
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Visibility : Prevent and Detect 100TB Security Intelligence 100TB Security Intelligence 1.6M Deployed Devices 1.6M Deployed Devices 13B Web Requests 13B Web Requests 150,000 Micro- applications 150,000 Micro- applications 1,000 Applications 1,000 Applications 93B Daily Email Messages 93B Daily Email Messages 35% Enterprise Email 35% Enterprise Email 5,500 IPS Signatures 5,500 IPS Signatures 150M Deployed Endpoints 150M Deployed Endpoints 3-5 min Updates 3-5 min Updates 5B Daily Email Connections 5B Daily Email Connections 4.5B Daily Email Blocks 4.5B Daily Email Blocks
14
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Trusted Services …provide the living space Identity-based access control Secure mobile access Secure cloud migration
15
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Visibility into who and what is connected to your network Automation for simplifying operations and adapting to changing needs Controls for limiting access to information and resources Cisco Identity Services Engine (ISE), TrustSec, Security Group Tags, AnyConnect
16
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Trusted WiFi Is Mr. Allen’s lab work ready yet? Not yet but i will let you know the moment it arrives Bring Your Own Device... Consumerization of IT (AnyConnect, ASA, IronPort) Wireless LAN security (IDS, Clean Air) Teleworkers and the virtual office (CVO)
17
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Security Education www.cisco.com/go/securityeducation Security Intelligence Operations www.cisco.com/security Architecture of Trust www.cisco.com/web/strategy/docs/gov/A rchitecture_of_Trust_WP.pdf Cisco Annual Security Report www.cisco.com/go/securityreport
18
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Thank you. pking@cisco.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.