SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
The Secure Borderless Network
Gordon Thomson
Director of Security Sales, Europe
November 4, 2010
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Urgent Sales Quote
Hello,
Our team needs a sales quote ASAP.
Please respond as soon as possible.
https://www.salesforce.com/
Urgent! Need Sales Quote
User : ED
Hello,
Our team needs a sales quote ASAP.
Please respond as soon as possible.
https://www.salesforce.com/
Urgent! Need Sales Quote
User : TED
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Cisco Secure Mobility
3
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
No Cisco Secure Mobility
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
While reporters and onlookers were
lamenting the passing of the King of Pop…
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 6
6
6
6
6
6
6
6
6
6
6
6
Fri
June
26
20:00
0.00%
1.00%
2.00%
3.00%
4.00%
5.00%
6.00%
Michael Jackson Spam as a Percentage of Global Spam
Sat
June
27
02:00
Sat
June
27
08:00
Sat
June
27
14:00
Sat
June
27
20:00
Sun
June
28
02:00
Sun
June
28
08:00
…criminals spewed over 2 billion Michael Jackson
spam messages
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Web 2.0 Abuse
Commercial tools for account creation, posting,
CAPTCHA bypass, and IP rotation are readily available
Targets popular sites and blogs including Gmail,
Yahoo, Facebook, Twitter, and Craigslist
Enables abuse of many services including webmail
account creation for spamming
7
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Botnet Trends
Reducing……………
Better Hidden, More Refined, but
Hard Working as Ever
2007: Big Botnet story was Storm
2008: Storm not dead yet, now joined by Kraken/Bobax and Asprox
2009: Storm evolves to Waledac, Conficker, Koobface
2009: Zeus………what‘s next?
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 9
9
9
9
9
9
9
9
9
9
9
9
Strategic Alliances:
Conficker and Waledac
Waledac monetizes Conficker botnet
 Fake and malicious SMS software
 Scareware Antivirus software
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 10
10
10
10
10
10
10
10
10
10
10
10
Service dedicated to checking if a malware
executable is detectable by AV engines
Criminal SaaS Offerings Expand
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Rise in SMS Attacks
Often will direct users to call automated phone
systems designed to steal personal info
Targeted (by area code)
Credible
―Smishing‖: SMS being used to
deliver phishing links
Smartphone OS vulnerability
exploits being discovered
11
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Security Top of Agenda
‗How important are each of the following IT initiatives to your
organizations usiness or corporate initiatives for the coming year?‗
1st Security Enhancement
3rd Updating Disaster recovery
5th Beginning/Updating Server
Virtualisation
11th Adoption of Unified
Communications
Technology
IT Managers place highest priority on adoption of security
Critical Priority High Priority Low Priority Not on our agenda
Source: Wedbush Morgan, Jan. 2010,
49% 36% 12% 3%
35% 38% 21% 5%
34% 35% 25% 5%
25% 35% 26% 14%
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 13
13
13
13
13
13
13
13
13
13
13
13
‖
I need security to be simpler,
transparent to the user and
more agile.
―
— John Stewart
CSO Cisco
Collaboration is changing
workplace experience
Cloud computing
drives efficiency
Vendor consolidation
lowers costs
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 14
14
14
14
14
14
14
14
14
14
14
14
My business has a mass of
data. I need to identify which
data needs protection, and put
systems in place to protect it.
―
— Dave Martin
CSO EMC
‖
Data theft turns
―professional‖
Regulations make data
control more critical
Anytime, anywhere access
increases risk
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 15
15
15
15
15
15
15
15
15
15
15
15
I need to be thinking about
all threats – rational and
irrational, amateur,
professional and political.
―
‖
— Charlie Forand
CSO Verizon
Cyber crime fuels
malicious R&D
Industrial espionage
is a real threat
Political attacks are
growing threat
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 16
16
16
16
16
16
16
16
16
16
16
16
Business Imperatives
Security Imperatives
Simplify
Security for the User,
the Business, and for
the Operations
Maintain Regulatory
Compliance and
Manage Risk Well
Design and Defend
for Unpredictable
Threats
Enable
Business Speed
and Agility
Maintain Regulatory
Compliance and
Manage Risk Well
Protect Intellectual
Property
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
17
17
17
17
17
17
The European CIO Landscape
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
The Customer’s Problem
Theft
Unintentional
Loss
Virus Scanning - Host & Server
Anomaly Detection
& Mitigation
Encryption Software
One-Time
Token Software
Multifunction
Security
Firewall
Physical
Security
Endpoint Security
Network Intrusion
Protection
Router/Switch
Security
Security
Management
VPN
Compliance
Validation
Application
Optimization
Identity
Management
Security Alerts
Event Logging
Application
Vulnerability
Assessment
Access Control &
Video Surveillance
Vulnerability Scan
Risk Management
Facility
Management
Application
Security
Policy Access
Control
Identity
Web Security
Website
Defacement
Loss of
Confidentiality
Virus
Outbreak
DDoS
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
19
19
19
19
19
19
Our Approach to Security
needs to Change
Improve Effectiveness
Reduce Risk
Control Costs
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 20
20
20
20
20
20
20
20
20
20
20
20
Opposing Forces
Access Control
Cyber Security
Control Open
Smart Connected Communities
Mobility
Cloud
Collaboration
Virtualization
Smart Grid
Connected Cameras, Printers…
Acceptable Use
Threat Protection
Data Security
Compliance
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 21
21
21
21
21
21
21
21
21
21
21
21
The Traditional Network
DMZ and Server
Desktop
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 22
22
22
22
22
22
22
22
22
22
22
22
Any Device, Anytime, Anywhere Workplace
Applications and Data Are Now Mobile
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 23
23
23
23
23
23
23
23
23
23
23
23
Applications and Data Are Now Mobile
Security Extends from the Network
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 24
24
24
24
24
24
24
24
24
24
24
24
From Self-Defending Network to Secure
Borderless Networks
Keep the
Bad Guys
Out
Firewall
Access Control
Intrusion
Prevention
Block Attacks
Content
Security
Email & Web
Self-Defending Network
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 25
25
25
25
25
25
25
25
25
25
25
25
From Self-Defending Network to Secure
Borderless Networks
Self-Defending Network
Enable
Secure
Borderless
Access
Firewall
Access Control
Intrusion
Prevention
Block Attacks
Content
Security
Email & Web
Policy & Identity
Trusted Access
Secure Mobility
Always On
Cloud Security
Hosted/Hybrid
New Security Requirements
Keep the
Bad Guys
Out
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 26
26
26
26
26
26
26
26
26
26
26
26
From Self-Defending Network to Secure
Borderless Networks
Self-Defending Network
Enable
Secure
Borderless
Access
Keep the
Bad Guys
Out
Secure Mobility
Always On
Secure Borderless Networks
Policy & Identity
Trusted Access
Cloud Security
Hosted/Hybrid
Cisco Security Intelligence Operations
Firewall
Access Control
Intrusion
Prevention
Block Attacks
Content
Security
Email & Web
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 27
27
27
27
27
27
27
27
27
27
27
27
Cisco’s Security Approach
Accurately, Seamlessly & Always On
DEFEND
Defend Against
Threats
Anyone, Anywhere, Anything, Anytime
Threat Defence and
Risk Reduction
EXTEND PREVENT COMPLY
Achieve Regulatory
Compliance
Prevent Loss of
Business Assets
Secure Enterprise
Connectivity
Secure Mobile
Workforce
Physical and Data
Loss Prevention
Governance, Risk
and Compliance
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
New Business Models in Security
Suitable for single site, no mobile
workers, low perception of security risk,
DIY mentality.
Appliance
Self-Managed, On-Premise
Hybrid Hosted
Divided Control, On-Premise &
Cloud-Based
Managed
Fully-Managed, On-Premise or
DC.
Suitable for multiple sites, many
mobile workers, TCO aware , Cloud
friendly.
Large HQ, hub sites, many mobile
workers, but cloud not strategic.
Company outsource to SI or SP.
Technology agnostic.
Hosted
Cloud-Based, SaaS
Infrastructure
Trusted Systems
Management
Endpoint Cloud
Services
Partners Site Licenses
The Whole Offer
Cisco Security Architecture
Global Intelligence
Local Intelligence
Trusted Systems
Management
Endpoint Cloud
Services
Partners Site Licenses
The Whole Offer
The Cisco Advantage
Global Intelligence
Local Intelligence
AnyConnect
Hybrid Scanning
TrustSec
Security Intelligence Operations
Policy
Network Integration
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 31
31
31
31
31
31
31
31
31
31
31
31
The New Borderless Organization
Securely, Reliably, Seamlessly
Borderless Experience
Anything
Anytime
Anywhere
Anyone
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 32
32
32
32
32
32
32
32
32
32
32
32
Critical Questions to Consider
Do I Have a Consistent Access Policy Architecture Across My
Network for all Users and Devices?
Can Mobile Devices Access My Network Securely, Reliably and Seamlessly?
Can My Network Deliver Real-Time Collaboration Experiences?
Can My Network Deliver Protection from the Premises to the Cloud?
Can My Network Optimize Performance of Applications
Anytime, Anywhere?
Am I Using My Network to Reduce My Energy Costs?
Is My Network Ready for Current and Future
Regulatory Requirements?
Where Am I Now? Where Do I Start?
1
2
3
4
5
6
7
8
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
33
33
33
33
33
33
SECURITY NEEDS TO
SECURE, ENABLE AND
CONTROL COST
Secure Borderless
Networks delivers the
anytime, anywhere
experience securely
34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID

Contenu connexe

Plus de Infosecurity2010

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud - Infosecurity2010
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Infosecurity2010
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Infosecurity2010
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtInfosecurity2010
 

Plus de Infosecurity2010 (9)

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Gordon Thomson Infosecurity.nl 4 november Jaarbeurs Utrecht

  • 1. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID The Secure Borderless Network Gordon Thomson Director of Security Sales, Europe November 4, 2010
  • 2. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID Urgent Sales Quote Hello, Our team needs a sales quote ASAP. Please respond as soon as possible. https://www.salesforce.com/ Urgent! Need Sales Quote User : ED Hello, Our team needs a sales quote ASAP. Please respond as soon as possible. https://www.salesforce.com/ Urgent! Need Sales Quote User : TED
  • 3. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID Cisco Secure Mobility 3
  • 4. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID No Cisco Secure Mobility
  • 5. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID While reporters and onlookers were lamenting the passing of the King of Pop…
  • 6. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 6 6 6 6 6 6 6 6 6 6 6 6 Fri June 26 20:00 0.00% 1.00% 2.00% 3.00% 4.00% 5.00% 6.00% Michael Jackson Spam as a Percentage of Global Spam Sat June 27 02:00 Sat June 27 08:00 Sat June 27 14:00 Sat June 27 20:00 Sun June 28 02:00 Sun June 28 08:00 …criminals spewed over 2 billion Michael Jackson spam messages
  • 7. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID Web 2.0 Abuse Commercial tools for account creation, posting, CAPTCHA bypass, and IP rotation are readily available Targets popular sites and blogs including Gmail, Yahoo, Facebook, Twitter, and Craigslist Enables abuse of many services including webmail account creation for spamming 7
  • 8. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID Botnet Trends Reducing…………… Better Hidden, More Refined, but Hard Working as Ever 2007: Big Botnet story was Storm 2008: Storm not dead yet, now joined by Kraken/Bobax and Asprox 2009: Storm evolves to Waledac, Conficker, Koobface 2009: Zeus………what‘s next?
  • 9. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 9 9 9 9 9 9 9 9 9 9 9 9 Strategic Alliances: Conficker and Waledac Waledac monetizes Conficker botnet  Fake and malicious SMS software  Scareware Antivirus software
  • 10. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 10 10 10 10 10 10 10 10 10 10 10 10 Service dedicated to checking if a malware executable is detectable by AV engines Criminal SaaS Offerings Expand
  • 11. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID Rise in SMS Attacks Often will direct users to call automated phone systems designed to steal personal info Targeted (by area code) Credible ―Smishing‖: SMS being used to deliver phishing links Smartphone OS vulnerability exploits being discovered 11
  • 12. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID Security Top of Agenda ‗How important are each of the following IT initiatives to your organizations usiness or corporate initiatives for the coming year?‗ 1st Security Enhancement 3rd Updating Disaster recovery 5th Beginning/Updating Server Virtualisation 11th Adoption of Unified Communications Technology IT Managers place highest priority on adoption of security Critical Priority High Priority Low Priority Not on our agenda Source: Wedbush Morgan, Jan. 2010, 49% 36% 12% 3% 35% 38% 21% 5% 34% 35% 25% 5% 25% 35% 26% 14%
  • 13. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 13 13 13 13 13 13 13 13 13 13 13 13 ‖ I need security to be simpler, transparent to the user and more agile. ― — John Stewart CSO Cisco Collaboration is changing workplace experience Cloud computing drives efficiency Vendor consolidation lowers costs
  • 14. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 14 14 14 14 14 14 14 14 14 14 14 14 My business has a mass of data. I need to identify which data needs protection, and put systems in place to protect it. ― — Dave Martin CSO EMC ‖ Data theft turns ―professional‖ Regulations make data control more critical Anytime, anywhere access increases risk
  • 15. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 15 15 15 15 15 15 15 15 15 15 15 15 I need to be thinking about all threats – rational and irrational, amateur, professional and political. ― ‖ — Charlie Forand CSO Verizon Cyber crime fuels malicious R&D Industrial espionage is a real threat Political attacks are growing threat
  • 16. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 16 16 16 16 16 16 16 16 16 16 16 16 Business Imperatives Security Imperatives Simplify Security for the User, the Business, and for the Operations Maintain Regulatory Compliance and Manage Risk Well Design and Defend for Unpredictable Threats Enable Business Speed and Agility Maintain Regulatory Compliance and Manage Risk Well Protect Intellectual Property
  • 17. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 17 17 17 17 17 17 The European CIO Landscape
  • 18. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID The Customer’s Problem Theft Unintentional Loss Virus Scanning - Host & Server Anomaly Detection & Mitigation Encryption Software One-Time Token Software Multifunction Security Firewall Physical Security Endpoint Security Network Intrusion Protection Router/Switch Security Security Management VPN Compliance Validation Application Optimization Identity Management Security Alerts Event Logging Application Vulnerability Assessment Access Control & Video Surveillance Vulnerability Scan Risk Management Facility Management Application Security Policy Access Control Identity Web Security Website Defacement Loss of Confidentiality Virus Outbreak DDoS
  • 19. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 19 19 19 19 19 19 Our Approach to Security needs to Change Improve Effectiveness Reduce Risk Control Costs
  • 20. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 20 20 20 20 20 20 20 20 20 20 20 20 Opposing Forces Access Control Cyber Security Control Open Smart Connected Communities Mobility Cloud Collaboration Virtualization Smart Grid Connected Cameras, Printers… Acceptable Use Threat Protection Data Security Compliance
  • 21. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 21 21 21 21 21 21 21 21 21 21 21 21 The Traditional Network DMZ and Server Desktop
  • 22. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 22 22 22 22 22 22 22 22 22 22 22 22 Any Device, Anytime, Anywhere Workplace Applications and Data Are Now Mobile
  • 23. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 23 23 23 23 23 23 23 23 23 23 23 23 Applications and Data Are Now Mobile Security Extends from the Network
  • 24. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 24 24 24 24 24 24 24 24 24 24 24 24 From Self-Defending Network to Secure Borderless Networks Keep the Bad Guys Out Firewall Access Control Intrusion Prevention Block Attacks Content Security Email & Web Self-Defending Network
  • 25. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 25 25 25 25 25 25 25 25 25 25 25 25 From Self-Defending Network to Secure Borderless Networks Self-Defending Network Enable Secure Borderless Access Firewall Access Control Intrusion Prevention Block Attacks Content Security Email & Web Policy & Identity Trusted Access Secure Mobility Always On Cloud Security Hosted/Hybrid New Security Requirements Keep the Bad Guys Out
  • 26. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 26 26 26 26 26 26 26 26 26 26 26 26 From Self-Defending Network to Secure Borderless Networks Self-Defending Network Enable Secure Borderless Access Keep the Bad Guys Out Secure Mobility Always On Secure Borderless Networks Policy & Identity Trusted Access Cloud Security Hosted/Hybrid Cisco Security Intelligence Operations Firewall Access Control Intrusion Prevention Block Attacks Content Security Email & Web
  • 27. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 27 27 27 27 27 27 27 27 27 27 27 27 Cisco’s Security Approach Accurately, Seamlessly & Always On DEFEND Defend Against Threats Anyone, Anywhere, Anything, Anytime Threat Defence and Risk Reduction EXTEND PREVENT COMPLY Achieve Regulatory Compliance Prevent Loss of Business Assets Secure Enterprise Connectivity Secure Mobile Workforce Physical and Data Loss Prevention Governance, Risk and Compliance
  • 28. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID New Business Models in Security Suitable for single site, no mobile workers, low perception of security risk, DIY mentality. Appliance Self-Managed, On-Premise Hybrid Hosted Divided Control, On-Premise & Cloud-Based Managed Fully-Managed, On-Premise or DC. Suitable for multiple sites, many mobile workers, TCO aware , Cloud friendly. Large HQ, hub sites, many mobile workers, but cloud not strategic. Company outsource to SI or SP. Technology agnostic. Hosted Cloud-Based, SaaS Infrastructure
  • 29. Trusted Systems Management Endpoint Cloud Services Partners Site Licenses The Whole Offer Cisco Security Architecture Global Intelligence Local Intelligence
  • 30. Trusted Systems Management Endpoint Cloud Services Partners Site Licenses The Whole Offer The Cisco Advantage Global Intelligence Local Intelligence AnyConnect Hybrid Scanning TrustSec Security Intelligence Operations Policy Network Integration
  • 31. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 31 31 31 31 31 31 31 31 31 31 31 31 The New Borderless Organization Securely, Reliably, Seamlessly Borderless Experience Anything Anytime Anywhere Anyone
  • 32. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 32 32 32 32 32 32 32 32 32 32 32 32 Critical Questions to Consider Do I Have a Consistent Access Policy Architecture Across My Network for all Users and Devices? Can Mobile Devices Access My Network Securely, Reliably and Seamlessly? Can My Network Deliver Real-Time Collaboration Experiences? Can My Network Deliver Protection from the Premises to the Cloud? Can My Network Optimize Performance of Applications Anytime, Anywhere? Am I Using My Network to Reduce My Energy Costs? Is My Network Ready for Current and Future Regulatory Requirements? Where Am I Now? Where Do I Start? 1 2 3 4 5 6 7 8
  • 33. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 33 33 33 33 33 33 SECURITY NEEDS TO SECURE, ENABLE AND CONTROL COST Secure Borderless Networks delivers the anytime, anywhere experience securely
  • 34. 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID