CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt...
Embed Size (px)
Transcript of CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt...

Changing the equation with Cisco Security
CLOSING THE GAP
Christofer Tibbelin
Säkerhetsarkitekt
Chung-wai Lee
Säkerhetsspecialist

AGENDA
• Trendspaning
• Är säkerhetsarbetet annorlunda idag?
• Vad lägger Cisco sitt krut?
• Kundcase
• Summering

4-YEAR OLD RANSOMWARE MILLIONAIRE
#evilpumpkin

MEGATRENDS DISRUPTING TRADITIONAL SECURITY THINKING
Cloud Adoption
Internet of Things
Internet is going dark

IT IS NOT A SIDE BUSINESS ANYMORE.
IT Usage
IT Requirements
IT Expectation

SECURITY IS NOT A PATCH WORK

SECURITY IS NOT A PATCH WORK
• Network Security
• Client Security
• Server Security
• Application Security
• Data Security
• Development Security
• Physical Security
Important that
these work together
Architecture instead of
point solutions

IT-SECURITY’S BUILDING BLOCKS
Confidentiality Integrity
AvailabilityTraceability
Compliance

Early Detection
Accurate Scoping
Proper Containment
Reassess Defences
ENHANCE YOUR SECURITY CAPABILITY
Security
Effectiveness

CISCO SECURITY ARCHITECTURE
– Threat Intelligence
Services
Integrated Threat Defense
Endpoint CloudNetwork

A REAL LIFE EXAMPLE
Zero-day attack
unknown to Anti-virus
4. Launch ransomware
& encrypt data
Domains registered
only hours before the
attack
News site1. Reading news
Ransomware
Key Server 5. Post cryptokey
Malwartising
site3. Redirect and Download file
2. Go and fetch ad
A client
vulnerability

HOW CYGATE & CISCO SOLVE THIS ATTACK
News site
Ransomware
Key Server
Malwartising
site
Block and trace with cloud
Trace and quarantine device with network
Block and trace with endpoint

THE SECURITY EFFECTIVENESS GAP

CISCO SECURITY CLOSES THE GAPand Changing the Equation

HOW IS YOUR SECURITY?
How do you control who gets onto
your network?
How do you find and contain problems fast?
How do you simplify networksegmentation?
How do you protect users
wherever they work?
How do you stop threats
at the edge?

BETTER TOGETHER