Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

Similar documents
Cisco Systems Korea

Cisco Self Defending Network

A Unified Threat Defense: The Need for Security Convergence

Wireless and Network Security Integration Solution Overview

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

CCISO Blueprint v1. EC-Council

Cisco ASA 5500 Series IPS Edition for the Enterprise

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Spotlight Report. Information Security. Presented by. Group Partner

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

AT&T Endpoint Security

Future-ready security for small and mid-size enterprises

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Security Assessment Checklist

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Solution Architecture

Understanding Network Access Control: What it means for your enterprise

Safe & Secure Environments for School. Ricky Elias Security Architect Advanced Technologies (Security)

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Cisco Network Admission Control (NAC) Solution

CA Security Management

IBM Next Generation Intrusion Prevention System

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion

Cisco ASA 5500 Series IPS Solution

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

IBM Security Network Protection Solutions

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

INTELLIGENCE DRIVEN GRC FOR SECURITY

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

Self Defending Networks

Cyber Security Audit & Roadmap Business Process and

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

AKAMAI CLOUD SECURITY SOLUTIONS

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

What It Takes to be a CISO in 2017

Position Description IT Auditor

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Securing Your Most Sensitive Data

locuz.com SOC Services

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Cisco NAC Network Module for Integrated Services Routers

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

DIGITAL TRUST Making digital work by making digital secure

Exam: : VPN/Security. Ver :

NETWORK THREATS DEMAN

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Business Strategy Theatre

Juniper Networks Adaptive Threat Management Solutions

Cyber Criminal Methods & Prevention Techniques. By

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Nebraska CERT Conference

Management Information Systems. B15. Managing Information Resources and IT Security

Accelerate Your Enterprise Private Cloud Initiative

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

External Supplier Control Obligations. Cyber Security

Securing Today s Mobile Workforce

Improving Security in the Application Development Life-cycle

McAfee Embedded Control

Investigative Response Case Metrics Initiative Preliminary findings from 700+ data compromise investigations

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Securing a Dynamic Infrastructure. IT Virtualization new challenges

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010

CIH

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

SECURITY SERVICES SECURITY

Trend Micro Deep Security

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Combating Today s Cyber Threats Inside Look at McAfee s Security

Symantec Endpoint Protection

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Risk Advisory Academy Training Brochure

Proactive Approach to Cyber Security

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Exam : Title : ASAM Advanced Security for Account Managers Exam. Version : Demo

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

GDPR Update and ENISA guidelines

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

Position Title: IT Security Specialist

Automating the Top 20 CIS Critical Security Controls

Stopping Advanced Persistent Threats In Cloud and DataCenters

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Converged World. Martin Capurro

CISCO EXAM QUESTIONS & ANSWERS

SOLUTION BRIEF FPO. Imperva Simplifies and Automates PCI DSS Compliance

Digital Wind Cyber Security from GE Renewable Energy

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.

Symantec Network Access Control Starter Edition

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Transcription:

Threat Control and Containment in Intelligent Networks Philippe Roggeband - proggeba@cisco.com Product Manager, Security, Emerging Markets 1

Agenda Threat Control and Containment Trends in motivation The Business Context Self-Defending Networks What s the ROI? Q&A 2

Trends in motivations The threat economy 3

Some statistics 4

Threat Economy: In the Past Writers Asset End Value Tool and Toolkit Writers Malware Writers Virus Worm Trojans Compromise Individual Host or Application Compromise Environment Fame Theft Espionage (Corporate/ Government) 5

Threat Economy: Today Writers First Stage Second Stage Abusers Middle Men Abusers End Value Tool and Toolkit Writers Hacker/Direct Attack Compromised Host and Application Fame Theft Malware Writers Worms Viruses Trojans Spyware Machine Harvesting Information Harvesting Internal Theft: Abuse of Privilege Bot-Net Creation Bot-Net Management: For Rent, for Lease, for Sale Personal Information Information Brokerage Electronic IP Leakage Extortionist/ DDoS-for-Hire Spammer Phisher Pharmer/DNS Poisoning Identity Theft Espionage (Corporate/ Government) Extorted Pay-Offs Commercial Sales Fraudulent Sales Click-Through Revenue Financial Fraud 6

Application Security: Server-Side Attacks Attacks on application infrastructure continues, largely on custom applications (75% of attacks at application layer target custom apps) Web front-ends continue to be vulnerable, largely due to lack of implementation of solutions Popular Attacks Injection attacks: Manipulating a backend system by injecting commands and/or code into fields in a front-end query system SQL injection is the most famous form injects SQL commands into fields in a web page Cross-site scripting: Malicious gathering of data from an end-user by injection of a script into a web page Often-times links to a offsite malicious web page Cookie Tampering: Manipulation of session information stored in a cookie Allows manipulation of the session, even when input validation is used in the application 7

Attacks on Data: Data Leakage One of the year s Hot Topics Broad term encompassing multiple different challenges: Security of Data at rest Security of Data in motion Identity-based access control Both malicious and inadvertent disclosures Issue has become topical typically for Compliance reasons However, broader topic involves business risk management How do I avoid inadvertent disclosures? How do I protect my information assets from flowing to my competitors? How do I avoid ending up in the news? 8

Evolving Business Context 9

Explaining Security in Business Terms Information is an asset Protection of valuable assets against: Loss Misuse Disclosure Damage Information Security benchmark: Confidentiality Integrity Availability 10

Security = Top Business Issue Top Business Trends Top Security Challenges Ranking Ranking Security breaches/business disruptions 1 Operating costs/budgets 2 Data protection and privacy 3 Need for revenue growth 4 Use of information in products/services 5 Economic recovery 6 Single view of customer 7 Faster innovation 8 Greater transparency in reporting 9 Enterprise risk management 10 1 2 3 4 5 6 7 8 9 10 Limited budget Regulatory compliance Educating executives on risks Scope, volume and proliferation of data/devices Not enough security staff Wireless LANs Mobile clients Company growth Volume and complexity of network traffic Lack of key security skills Source: Gartner Group, 2004 Source: CSO/Cisco Proprietary Research, April 2006 11

Stakeholders in Network Security Boards Executive Management I.T. Staff Employees Auditors External Legal Counsel 12

Business Leaders & Security Axioms There is no such thing as 100% security Security is not a one-time effort Good security involves: People Process Technology Improve Secure Test Monitor Use proven products from reputable suppliers (source: I.T. Governance Institute) 13

Security Standards & Legislations (partial list) EU Directive on Data Protection TickIT ISO 13335 EC Privacy ISO 17799 NIST 800 COSO SOX HIPAA BS 7799 ISO 15408 CobIT ITIL Basel II ISO 27001 GBLA 14

Self-defending Networks 15

Cisco Self-Defending Network A systems approach leveraging the Network Integrated Enabling every element to be a point of defense and policy enforcement Collaborative Collaboration among the services and devices throughout the network to thwart attacks Adaptive Proactive security technologies that automatically prevent threats 16

Self-Defending Network Defined Efficient security management, control, and response Operational Control Technologies and security services to Mitigate the effects of outbreaks Protect critical assets Ensure privacy Confidential Communications Secure Transactions THREAT CONTROL Security as an integral, fundamental network capability Embedded security leverages network investment Secure Network Platform 17

Network as Platform for Security Integrated Services Routers Integrate Cisco IOS Firewall, VPN, and Intrusion Prevention System (IPS) services across the Cisco router portfolio Deploy new security features on your existing routers using Cisco IOS Software NAC-enabled Cisco Catalyst Switches Denial-of-service (DoS) attack mitigation Integrated security service modules for high-performance threat protection and secure connectivity Man-in-the-middle attack mitigation NAC-enabled Adaptive Security Appliances High-performance firewall, IPS, network antivirus, and IPSec/SSL VPN technologies all in one unified architecture Device consolidation reduces overall deployment and operations costs and complexities NAC-enabled Comprehensive and simple almost the holy grail. Garth Brown, President, Semaphore 18

Threat Control and Containment: Proactive, Adaptive Mitigation of Outbreaks and Infection Advanced Technologies Behavioral-based endpoint protection, DDoS mitigation, intrusion prevention, network antivirus, policy enforcement, proactive response Benefits Proactively protects against known and unknown threats Enforces endpoint compliance for more manageable patching, updating Proactively contains infections and outbreaks with distributed mitigation Reduces operational costs 19

Confidential Communications: Secure Data, Voice, Video, and Wireless Advanced Technologies Advanced IPSec and SSL VPN Services, secure voice, secure wireless Benefits Enjoy productivity gains Increase flexibility Maintain privacy and confidentiality Cost-effectively extend reach of network 20

Secure Transactions: Protect Business Assets Against Theft and Exposure Advanced Technology Application-layer inspection Benefits Prevent application availability disruption Ensure customer privacy Protect business assets from exposure Reduce litigation risk 21

Operational Control and Policy Management: Best Practices Enablement Benefits Increase speed and accuracy of policy deployment Gain visibility to monitor end-to-end security More rapidly respond to threats Enforce corporate policy compliance Enable proper workflow management Provisioning Identity Self-Defending Network Fabric Monitoring Analysis Mitigation Auditing Simplified Environment = Greater Visibility, Easier to Manage 22

Day Zero and Intrusion Protection Across the Enterprise The Industry s Most Complete Intrusion Prevention Solution CSA NAC : Enforce Security Policies Perimeter Cisco ASA Unified Management, Correlation, and Analysis CSA Cisco ISR Service Provider Cisco PIX CS- Manager, CS- MARS CSA Perimeter Protection Cisco Guard Cisco IPS 4200 Cisco Catalyst Service Modules CSA Day Zero Endpoint Protection DDoS and Anti- Spoofing Mitigation Identify and Control Outbreaks Server Protection 23

But what s the ROI? 24

The Insurance Policy Calculation High Total Cost of Ownership Optimal Cost-Risk Solution Acceptable Risk Total Cost Curve Maximum Allowed Cost Low Low Risk High Because 100% security can never be reached, security should be positioned to meet both the acceptable risk and total cost of ownership requirements. 25

Benefits of Self-Defending Networks IMPROVED VALUE: Reduces integration costs security is already integrated into the network Allows proactive, planned upgrades at traditional IT refresh cycles Improves efficiency of security management 26

Why Cisco? We Are Committed to Security Product and Technology Innovation 1500 security-focused engineers 15 acquisitions added to our solution portfolio 65+ NAC partners worked collaboratively with us to deliver an unprecedented security vision Responsible Leadership NIAC Vulnerability Framework Committee Critical Infrastructure Assurance Group PSIRT responsible disclosure MySDN.com intelligence and best practices sharing Because the network is a strategic customer asset, the protection of its business-critical applications and resources is a top priority. John Chambers, CEO, Cisco Systems 27

Some Closing Thoughts 28

Q and A 29

30