SlideShare une entreprise Scribd logo
1  sur  59
RenuUpadhyay, Marketing Manger, Cisco Dan Larkin, Director, Strategic Operations, NCFTA Matt Schmitz, Senior Product Manager, Cisco SaurabhBhasin, Senior Product Line Manager, Cisco May 4, 2011 iPads on Your Network?Establish Visibility and Management Control
Mobile Security Assessment Agenda 1 2 3 Unified Policy management for Any Device Unified User and Access Management for Any Network
Users Have New ExpectationsThe Evolving Workplace Landscape Old School New School ,[object Object]
Work is a place you go to—limited off-campus access
IT visibility and control into user deices and applications
Anywhere, anytime, any device usage
Work is a function—globally dispersed, mixed device ownership
Change in IT control and management paradigmExecutive Employee IT
The User to Device Ratio Has Changed IT Resources Stay the Same Fixed User ,[object Object]
One user, one deviceMobile User ,[object Object]
One user, local devicesBorderless User ,[object Object]
One user, many devicesAccess Evolution Early 90s  Late 90s Today Effectively Support Users with Box Management Need for Policy and Control Need for Operational Efficiency
Some Questions to Consider Enterprises Are Trying to Embrace Mobility While Addressing Security Do I have the WLAN capacity and reliability to support increase in mobile devices? How do I enforce security policies on noncompliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the employee (tech savvy) who trade up to new devices? New policy? How do I protect my intellectual property/personal information? How do I monitor and troubleshoot user and client connectivity issues on my access (wired/wireless) network?
Dan LarkinDirector, Strategic OperationsNational Cyber Forensics Training Alliance
Executive Webinar May 4, 2011 I-Pad’s & similar products Coming to a network- near you…
Regardless of how you define the Threat….. It’s all about the “People” as… Assets….    Or… Liabilities!
Fundamentals always in play…. ,[object Object]
  Novelty – new technology – gadgets
  The world is flat – outsourcing –   supply chain – subcontracting
   Mergers/acquisitions –
Taking on new threats
 Knowing your new customer
  Who has the best Intel (regarding threats)  & how do we leverage that?,[object Object]
Targeting High Value customers/Social Networks
Bad guys are walking through the front door..
Laptops
Thumb drives
 I-Pads ,[object Object]
Who gets to play – who has to pay?
 Expanding services = expanding opportunity for exploits
  Similar pattern/opportunity for I-Pads (and similar   products)
   Real world examples,  and what we can expect next,[object Object]
Partnerships—Global & Growing Support from International Law Enforcement and Industry in 34 nations… TDY..and in-country model Australia Canada U.K. Germany Romania Italy India Turkey
   Historical Gaps/Obstacles Lack of “Trusted” Two-Way information sharing relationships with SME’s Compelled information sharing vs Voluntary - triggers legal issues, Lack of Neutral setting to analyze/triage open source or Industry owned intelligence  (Meet in the middle space)
We all need “a better environment”
PRO-ACTIVE EFFORTS Criminal On-Line FORUMS Carding-Credentials Tools/Techniques UCO Deep Penetration  UCO’s  Past & Ongoing  Subject Attribution - engagement Forecasting the Future
International Carding Alliance (ICA) Data Base  NCFTA/CIRFU/USPIS
Telco Threat Areas Mobile Smartphone applications ,[object Object]
Infection (malware, spyware, trojans)SMS  ,[object Object],Technology ,[object Object]
Near field communication
Scan and pay
BluetoothVoIP/Cable Vishing ,[object Object],Known Router hacking lines Video Conferencing lines Traffic pumping PBX Hacking Cable Modem Cloning Overlap Automated Calling Services Number Testing SIM cards TDoS attacks Spoofing
CyFin Trends: January 2011-Present ,[object Object]
Conference Bridge Compromises
Number Testing for PBX hacking
Automated Calling utilizing caller ID spoofing,[object Object]
Underground Forums Trends Popular Topics ,[object Object]
Smartphone malware coders
Discussion of Near Field Communication….Say you hear a lot of Audix mailbox recordings, then you are dealing with an Avaya PBX (which is a very popular VoIP PBX)….
Vulnerabilities exposed- I-Pads-Tablets…
Criminal Forums focus on I-Pad/Tablets TheHammer  I HAVE Iphones/Ipad SERIALS need methods!!!!  I have Iphone 3g/4g serials and Ipad as well. They are working i test them but i need the person who knows how to do the methods. I will pay him for the work and i have drops. If anyone knows it or know how to do it im ready and i dont like to waiste my time only if you are seriouse. Reply. 
Other Forum chatter- Exploits…. “Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution” “Viewing a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution… memory corruption issue existed in QuickLook's handling of Microsoft Office as well.” Cert weakness:  “An attacker with a privileged network position may intercept user credentials or other sensitive information”….”man-in-the-middle”
Mobile Malware: March 2011
Smartphone Applications: Who is involved? ,[object Object]
Service
Billing
Other areas affected by     mobile finance? ,[object Object]

Contenu connexe

Tendances

Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 
Sample part tests - mswin72010 - v1 - 0
Sample part  tests - mswin72010 - v1 - 0Sample part  tests - mswin72010 - v1 - 0
Sample part tests - mswin72010 - v1 - 0Orji Olisa
 
IWMW 2004: Life After Email Strategies For Collaboration in the 21st Century
IWMW 2004: Life After Email Strategies For Collaboration in the 21st CenturyIWMW 2004: Life After Email Strategies For Collaboration in the 21st Century
IWMW 2004: Life After Email Strategies For Collaboration in the 21st CenturyIWMW
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultationijtsrd
 
Digital Natives: University Migration
Digital Natives: University MigrationDigital Natives: University Migration
Digital Natives: University MigrationIngrid Melve
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondZeshan Sattar
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensicsSTO STRATEGY
 
Wireless information management, a review
Wireless information management, a reviewWireless information management, a review
Wireless information management, a reviewAndrew Olsen
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Judith A Rewerts Resume
Judith A Rewerts ResumeJudith A Rewerts Resume
Judith A Rewerts ResumeJudith Rewerts
 

Tendances (20)

Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Sfo
SfoSfo
Sfo
 
Sample part tests - mswin72010 - v1 - 0
Sample part  tests - mswin72010 - v1 - 0Sample part  tests - mswin72010 - v1 - 0
Sample part tests - mswin72010 - v1 - 0
 
Chp7 intranet
Chp7 intranetChp7 intranet
Chp7 intranet
 
IWMW 2004: Life After Email Strategies For Collaboration in the 21st Century
IWMW 2004: Life After Email Strategies For Collaboration in the 21st CenturyIWMW 2004: Life After Email Strategies For Collaboration in the 21st Century
IWMW 2004: Life After Email Strategies For Collaboration in the 21st Century
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultation
 
Digital Natives: University Migration
Digital Natives: University MigrationDigital Natives: University Migration
Digital Natives: University Migration
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensics
 
Wireless information management, a review
Wireless information management, a reviewWireless information management, a review
Wireless information management, a review
 
E-Commerce & E-Business in Layman Terms......
E-Commerce & E-Business in Layman Terms......E-Commerce & E-Business in Layman Terms......
E-Commerce & E-Business in Layman Terms......
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Judith A Rewerts Resume
Judith A Rewerts ResumeJudith A Rewerts Resume
Judith A Rewerts Resume
 

En vedette

Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesCisco Mobility
 
Software social y comunicaciones integradas en telefónica
Software social y comunicaciones integradas en telefónicaSoftware social y comunicaciones integradas en telefónica
Software social y comunicaciones integradas en telefónicaTelefónica Grandes Clientes
 
eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...
eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...
eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...Telefónica Grandes Clientes
 
Raquel Pinillos, Congreso DEC. Informe sobre nivel de la "operativización" d...
Raquel Pinillos, Congreso DEC.  Informe sobre nivel de la "operativización" d...Raquel Pinillos, Congreso DEC.  Informe sobre nivel de la "operativización" d...
Raquel Pinillos, Congreso DEC. Informe sobre nivel de la "operativización" d...Asociación DEC
 
The 2015 U.S. Mobile App Report - COMSCORE
The 2015 U.S. Mobile App Report - COMSCOREThe 2015 U.S. Mobile App Report - COMSCORE
The 2015 U.S. Mobile App Report - COMSCORERomain Fonnier
 
Ponencia Andrés Laseca en el evento Cloud Media de Telefónica
Ponencia Andrés Laseca en el evento Cloud Media de TelefónicaPonencia Andrés Laseca en el evento Cloud Media de Telefónica
Ponencia Andrés Laseca en el evento Cloud Media de TelefónicaTelefónica Grandes Clientes
 
Aprende a crear y desplegar una aplicación de python que use APIs de BlueVia
Aprende a crear y desplegar una aplicación de python que use APIs de BlueViaAprende a crear y desplegar una aplicación de python que use APIs de BlueVia
Aprende a crear y desplegar una aplicación de python que use APIs de BlueViaBlueVia
 
Una completa y pionera guía sobre Bitcoin, la moneda virtual
Una completa y pionera guía sobre Bitcoin, la moneda virtualUna completa y pionera guía sobre Bitcoin, la moneda virtual
Una completa y pionera guía sobre Bitcoin, la moneda virtualTelefónica Grandes Clientes
 
Gamification in 2012: Trends in Consumer and Enterprise Markets with Metrics
Gamification in 2012: Trends in Consumer and Enterprise Markets with MetricsGamification in 2012: Trends in Consumer and Enterprise Markets with Metrics
Gamification in 2012: Trends in Consumer and Enterprise Markets with MetricsWanda Meloni
 
Informe Ostelea Turismo Colaborativo 2015
Informe  Ostelea Turismo Colaborativo 2015Informe  Ostelea Turismo Colaborativo 2015
Informe Ostelea Turismo Colaborativo 2015Albert Canigueral
 
Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...
Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...
Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...Telefónica Grandes Clientes
 
iPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsiPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsCisco Mobility
 

En vedette (20)

Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
 
Software social y comunicaciones integradas en telefónica
Software social y comunicaciones integradas en telefónicaSoftware social y comunicaciones integradas en telefónica
Software social y comunicaciones integradas en telefónica
 
eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...
eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...
eCongress 2015: El nuevo consumidor. Ponencia de Manuel López Pérez, de Telef...
 
Cloud computing Autelsi
Cloud computing AutelsiCloud computing Autelsi
Cloud computing Autelsi
 
Innvovation Security Day Metashield
Innvovation Security Day MetashieldInnvovation Security Day Metashield
Innvovation Security Day Metashield
 
Innovation Security Day FAAST
Innovation Security Day FAASTInnovation Security Day FAAST
Innovation Security Day FAAST
 
Revolution Banking: Banca en un Futuro Digital
Revolution Banking: Banca en un Futuro DigitalRevolution Banking: Banca en un Futuro Digital
Revolution Banking: Banca en un Futuro Digital
 
Telefónica I Jornada Economia y Sociedad Digital
Telefónica I Jornada Economia y Sociedad DigitalTelefónica I Jornada Economia y Sociedad Digital
Telefónica I Jornada Economia y Sociedad Digital
 
Raquel Pinillos, Congreso DEC. Informe sobre nivel de la "operativización" d...
Raquel Pinillos, Congreso DEC.  Informe sobre nivel de la "operativización" d...Raquel Pinillos, Congreso DEC.  Informe sobre nivel de la "operativización" d...
Raquel Pinillos, Congreso DEC. Informe sobre nivel de la "operativización" d...
 
Social Engagement
Social EngagementSocial Engagement
Social Engagement
 
The 2015 U.S. Mobile App Report - COMSCORE
The 2015 U.S. Mobile App Report - COMSCOREThe 2015 U.S. Mobile App Report - COMSCORE
The 2015 U.S. Mobile App Report - COMSCORE
 
Ponencia Andrés Laseca en el evento Cloud Media de Telefónica
Ponencia Andrés Laseca en el evento Cloud Media de TelefónicaPonencia Andrés Laseca en el evento Cloud Media de Telefónica
Ponencia Andrés Laseca en el evento Cloud Media de Telefónica
 
Aprende a crear y desplegar una aplicación de python que use APIs de BlueVia
Aprende a crear y desplegar una aplicación de python que use APIs de BlueViaAprende a crear y desplegar una aplicación de python que use APIs de BlueVia
Aprende a crear y desplegar una aplicación de python que use APIs de BlueVia
 
Una completa y pionera guía sobre Bitcoin, la moneda virtual
Una completa y pionera guía sobre Bitcoin, la moneda virtualUna completa y pionera guía sobre Bitcoin, la moneda virtual
Una completa y pionera guía sobre Bitcoin, la moneda virtual
 
Análisis heart bleed
Análisis heart bleedAnálisis heart bleed
Análisis heart bleed
 
Gamification in 2012: Trends in Consumer and Enterprise Markets with Metrics
Gamification in 2012: Trends in Consumer and Enterprise Markets with MetricsGamification in 2012: Trends in Consumer and Enterprise Markets with Metrics
Gamification in 2012: Trends in Consumer and Enterprise Markets with Metrics
 
Informe Ostelea Turismo Colaborativo 2015
Informe  Ostelea Turismo Colaborativo 2015Informe  Ostelea Turismo Colaborativo 2015
Informe Ostelea Turismo Colaborativo 2015
 
Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...
Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...
Resultados Proyecto Valcronic presentados en Congreso Crónicos 2014. Más info...
 
iPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsiPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile Solutions
 
Predicciones cloud Telefónica para 2016
Predicciones cloud Telefónica para 2016Predicciones cloud Telefónica para 2016
Predicciones cloud Telefónica para 2016
 

Similaire à iPads on your network? Take Control with Unified Policy and Management

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile WorkshopTony Fish
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 

Similaire à iPads on your network? Take Control with Unified Policy and Management (20)

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Consumerization of IT
Consumerization of ITConsumerization of IT
Consumerization of IT
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 

Plus de Cisco Mobility

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolCisco Mobility
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco Mobility
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acCisco Mobility
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Cisco Mobility
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportCisco Mobility
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac ShiftCisco Mobility
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesCisco Mobility
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersCisco Mobility
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksCisco Mobility
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesCisco Mobility
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementCisco Mobility
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksCisco Mobility
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureCisco Mobility
 

Plus de Cisco Mobility (20)

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case study
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless Networks
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

iPads on your network? Take Control with Unified Policy and Management

  • 1. RenuUpadhyay, Marketing Manger, Cisco Dan Larkin, Director, Strategic Operations, NCFTA Matt Schmitz, Senior Product Manager, Cisco SaurabhBhasin, Senior Product Line Manager, Cisco May 4, 2011 iPads on Your Network?Establish Visibility and Management Control
  • 2. Mobile Security Assessment Agenda 1 2 3 Unified Policy management for Any Device Unified User and Access Management for Any Network
  • 3.
  • 4. Work is a place you go to—limited off-campus access
  • 5. IT visibility and control into user deices and applications
  • 7. Work is a function—globally dispersed, mixed device ownership
  • 8. Change in IT control and management paradigmExecutive Employee IT
  • 9.
  • 10.
  • 11.
  • 12. One user, many devicesAccess Evolution Early 90s Late 90s Today Effectively Support Users with Box Management Need for Policy and Control Need for Operational Efficiency
  • 13. Some Questions to Consider Enterprises Are Trying to Embrace Mobility While Addressing Security Do I have the WLAN capacity and reliability to support increase in mobile devices? How do I enforce security policies on noncompliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the employee (tech savvy) who trade up to new devices? New policy? How do I protect my intellectual property/personal information? How do I monitor and troubleshoot user and client connectivity issues on my access (wired/wireless) network?
  • 14. Dan LarkinDirector, Strategic OperationsNational Cyber Forensics Training Alliance
  • 15. Executive Webinar May 4, 2011 I-Pad’s & similar products Coming to a network- near you…
  • 16. Regardless of how you define the Threat….. It’s all about the “People” as… Assets…. Or… Liabilities!
  • 17.
  • 18. Novelty – new technology – gadgets
  • 19. The world is flat – outsourcing – supply chain – subcontracting
  • 20. Mergers/acquisitions –
  • 21. Taking on new threats
  • 22. Knowing your new customer
  • 23.
  • 24. Targeting High Value customers/Social Networks
  • 25. Bad guys are walking through the front door..
  • 28.
  • 29. Who gets to play – who has to pay?
  • 30. Expanding services = expanding opportunity for exploits
  • 31. Similar pattern/opportunity for I-Pads (and similar products)
  • 32.
  • 33. Partnerships—Global & Growing Support from International Law Enforcement and Industry in 34 nations… TDY..and in-country model Australia Canada U.K. Germany Romania Italy India Turkey
  • 34. Historical Gaps/Obstacles Lack of “Trusted” Two-Way information sharing relationships with SME’s Compelled information sharing vs Voluntary - triggers legal issues, Lack of Neutral setting to analyze/triage open source or Industry owned intelligence (Meet in the middle space)
  • 35. We all need “a better environment”
  • 36. PRO-ACTIVE EFFORTS Criminal On-Line FORUMS Carding-Credentials Tools/Techniques UCO Deep Penetration UCO’s Past & Ongoing Subject Attribution - engagement Forecasting the Future
  • 37. International Carding Alliance (ICA) Data Base NCFTA/CIRFU/USPIS
  • 38.
  • 39.
  • 42.
  • 43.
  • 45. Number Testing for PBX hacking
  • 46.
  • 47.
  • 49. Discussion of Near Field Communication….Say you hear a lot of Audix mailbox recordings, then you are dealing with an Avaya PBX (which is a very popular VoIP PBX)….
  • 51. Criminal Forums focus on I-Pad/Tablets TheHammer I HAVE Iphones/Ipad SERIALS need methods!!!!  I have Iphone 3g/4g serials and Ipad as well. They are working i test them but i need the person who knows how to do the methods. I will pay him for the work and i have drops. If anyone knows it or know how to do it im ready and i dont like to waiste my time only if you are seriouse. Reply. 
  • 52. Other Forum chatter- Exploits…. “Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution” “Viewing a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution… memory corruption issue existed in QuickLook's handling of Microsoft Office as well.” Cert weakness: “An attacker with a privileged network position may intercept user credentials or other sensitive information”….”man-in-the-middle”
  • 54.
  • 55.
  • 56.
  • 59.
  • 63. Contracted by financial institutions
  • 64.
  • 65.
  • 66.
  • 67.
  • 68. Why to get Plugged in Financial Srvs Partners DB’s ISP’s DB’s IDS Co’s ie Symantec DB’s L.E DBs Software Co DB’s via BSA NCFTA - CIRFU Space FBI Secure Space Other Fusion Centers Intel Merchants via MRC DB’s Other DB DPN DB SPAM DB US CERT DHS US Postal & Internat’l– L.E Referral to Law Enforcement & Coordination
  • 69.
  • 70. Social Networking Sites – Tied to tablets.
  • 71. Education, Education, Education…(where are the best early warning signs? Who owns them?)
  • 72. Policy/Procedures vs. Taking away choices
  • 73. Getting ahead of regulations (they will come)
  • 74. Re-defining your team—to fight the good fight….
  • 75.
  • 76. Evolving Policies in a Mobile World “Printers should only ever communicate internally.” Internet “Employees should be able to access everything but have no access on personal devices.” Cisco Switch Internal Resources Campus Network “Guest and partners are only allowed bandwidth constrained Internet access via wireless.” Cisco Access Point Cisco Wireless LAN Controller Policy Services
  • 77. BYOT: Bring Your Own Technology Access Challenges IT Is Struggling With: Classifying managed vs.. unmanaged endpoints ID devices that cannot authenticate User  host association But There Barriers: Certificates Endpoint certainty No automated way to discover new endpoints User Location Time Device Attribute X PC and Non-PC Devices
  • 78. Typical BYOT Policy Options “Employees can access everything from either corporate or personal devices. But non-employees are blocked.” Internet “Employees are required to use corporate devices. Personal devices are not allowed and there is no guest access.” Internal Resources Campus Network Limited Resources “Employees can access everything from corporate devices. Employees on personal devices and partners have restricted access.” Really Important! Policy Services
  • 79.
  • 85. Unified Policy Management for Any Device
  • 86. Introducing Identity Services EnginePart of the TrustSec Network Service Consistent policy Management integration Easier deployment Troubleshooting Monitoring Reporting Wired Wireless VPN Employees Devices Guests
  • 87.
  • 88. Migration program for older hardware
  • 89. License migration program for all software licenses
  • 90. Data and configurations migration tools available*Identity Services Engine *Available over multiple releases Existing Investments Protected
  • 91. Comprehensive Policy Solution for Any Device Purpose-Built, Complete, and Reliable Profiling Cisco ISE uses SNMP, NetFlow, DNS, RADIUS, HTTP, and DHCP to increase accuracy, reduce spoofability Works across wired and wireless Completely integrated with RADIUS/AAA Includes additional services (posture, guest/portal, etc.) Scalable Policy Enforcement Switch, WLAN controller, and VPN as an enforcement point Flexible control (VLAN, dACL/ACL, QoS, SGA, etc.) based on any contextual attributes (user, device, group, location, time, etc.) Unified Management ISE detailed reports and troubleshooting tools (user, device, session, etc.) can be accessed from within NCS 1.0 providing a single pane of glass into user, device, and network across wired and wireless infrastructure User Location Time Device Attribute X
  • 93. Identity Services Engine Offers a Robust Set of Capabilities Consolidated Services, Software Packages Session Directory Flexible Service Deployment ACS All-in-One HA Pair Admin Console M&T User ID Access Rights NAC Manager NAC Profiler ISE NAC Server Distributed PDPs NAC Guest Device (and IP/MAC) Location Tracks Active Users and Devices Optimize Where Services Run Simplify Deployment and Admin Policy Extensibility Manage Security Group Access Systemwide Monitoring and Troubleshooting SGT Public Private Staff Permit Permit Guest Deny Permit Keep Existing Logical Design Consolidate Data, Three-Click Drill-In Link in Policy Information Points
  • 94. Unified User and Access Management for Any Network
  • 95. Client Devices: Top Contributor to Network Performance Problems Contributors to Wireless Network Problems 400 350 300 250 Number of Customers 200 150 100 50 0 Client Devices (Drivers, Connections, Authentication, or Other Issues) RF Interference from Wi-Fi and/or Non-Wi-Fi Sources Unexpected Demand for Increase Coverage of Capacity Faulty Wireless Network Design Implementation Old or Outdated Wireless Technology Insufficient IT Administrator Expertise Other Major Issues Contributing to Wireless Network Problems A Recent Survey Shows That Respondents View Client Devices as the TOP Contributor to Wireless Network Performance Problems
  • 96. Introducing Cisco Prime Network Control System Converged Access Management for Wired and Wireless Networks Wireless | Wired | Security Policy | Network Services Unified Management Operations Users Policy Improved Network Visibility | Faster Troubleshooting | Eliminate Configuration Errors
  • 97. Single Integrated User and Access Dashboard High-Level View of Key Metrics with Contextual Drill-Down to Detailed Data Flexible platform: Accommodates new and experienced IT administrators Simple, intuitive user interface: Eliminates complexity User-defined customization: Display the most relevant information
  • 98. Unified User and Endpoint Services Correlated and focused wired/wireless client visibility Client health metrics Client posture and profile Client troubleshooting Client reporting Unknown device ID input Clear view of the end user landscape Who is connecting Using which device Are they authorized
  • 99. Integrated Access Infrastructure Visibility Wired and wireless discovery and inventory Add/detect infrastructure devices such as switches, WLAN controllers, and access points Comprehensive access infrastructure reporting View the access infrastructure as a whole or as discrete technologies Stolen asset notification Track when devices presumed stolen come back online
  • 100. Identity Services Engine Integration for True User and Access Management Converged Security and Policy Monitoring and Troubleshooting Enhance Infrastructure Security Streamline Service Operations Enforce Compliance Shows where security and policy problems exist Retrieves information directly from clients: Wired, wireless; authenticated, unauthenticated Reduces the time to troubleshoot security and policy problems Client posture status and client profiled views Drill deeper into security and policy issue details Direct linkage from Cisco NCS to Cisco ISE with contextual filtering
  • 101. Comprehensive Wireless Lifecycle Management Full Range of Lifecycle Capabilities Plan Deploy Optimize Monitor and Troubleshoot Remediate
  • 103.
  • 105. Direct access to Cisco support and services
  • 106. Empower first-tier to address issues without escalation
  • 107. Resolve problems faster with logical workflows
  • 109. Provide reliable access to network services
  • 110. Visibility at the access layer as networks become borderless
  • 111.
  • 112. Key Resources March 22ndCIN Webinar: iPad. Galaxy. Cius. Best Practices to Support the influx of Mobile Devices Dec 2ndCIN Webinar: Preparing the WLAN for mobile devices/tablets. Technical White Paper: Optimize the Cisco Unified Wireless Network to Support Wi-Fi Enabled Phones and Tablets White Paper: The Future of Network Security: Cisco SecureX Architecture
  • 113. Cisco’s Borderless Networks Solutions Prepare Your Enterprise Network for Mobile Devices The mobile security landscape is evolving Enabling mobility requires a comprehensive, consistent approach to user/ device access and network management Meet User Demand for Mobility